The document discusses the structure and components of an operating system. It covers computer hardware structure including the CPU, storage, and I/O devices. It then discusses system calls which allow user programs to request services from the operating system. Finally, it outlines some key components of operating systems including process management, memory management, file management, I/O management and more.
Operating system 02 os as an extended machineVaibhav Khanna
Functions performed by the
operating systems:
Managing the hardware resources of the
computer
Providing the user-interface components
Providing a platform for software developers
to write applications
Unit I
Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory Hierarchy, Cache Memory, Direct Memory Access, Multiprocessor and Multicore Organization. Operating system overview-objectives and functions, Evolution of Operating System.- Computer System OrganizationOperating System Structure and Operations- System Calls, System Programs, OS Generation and System Boot.
Operating system 02 os as an extended machineVaibhav Khanna
Functions performed by the
operating systems:
Managing the hardware resources of the
computer
Providing the user-interface components
Providing a platform for software developers
to write applications
Unit I
Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory Hierarchy, Cache Memory, Direct Memory Access, Multiprocessor and Multicore Organization. Operating system overview-objectives and functions, Evolution of Operating System.- Computer System OrganizationOperating System Structure and Operations- System Calls, System Programs, OS Generation and System Boot.
Operating System Concepts PresentationNitish Jadia
Operating System Concepts was presented by Nitish Jadia in Bhopal null meet, to make people aware of the internal workings of the OS they use.
The contents and explanation of this PPT was inspired and taken from Operating System Concepts by by silberschatz galvin gagne.
Unit I (8 Hrs)
Introduction to System Software , Overview of all system software’s: Operating system
I/O manager, Assembler, Compiler, Linker ,Loader.
Introductory Concepts: Operating system functions and characteristics, historical evolution
of operating systems, Real time systems, Distributed systems.
Unit II (8 Hrs)
Operating Systems: Methodologies for implementation of O/S service system calls,
system programs, Interrupt mechanisms.
Process - Concept of process and threads, Process states, Process management, Context
switching
Interaction between processes and OS Multithreading Process Control, Job schedulers,
Job Scheduling, scheduling criteria, scheduling algorithms
Unit III (8 Hrs)
Concurrency Control : Concurrency and Race Conditions, Mutual exclusion requirements
Software and hardware solutions, Semaphores, Monitors, Classical IPC problems and
solutions.
Deadlock : Characterization, Detection, Recovery, Avoidance and Prevention.
Unit IV (8 Hrs)
Memory management: Contiguous and non-contiguous, Swapping, Paging, Segmentation
and demand Paging, Virtual Memory, Management of Virtual memory: allocation, fetch and
replacement
Unit V (8 Hrs)
File Management: Concept, Access methods, Directory Structure, Protection, File System
implementation, Directory Implementation, Allocation methods, Free Space management,
efficiency and performance
IO systems: disk structure, disk scheduling, disk management.
Unit VI (8 Hrs)
Case Study of Linux: Structure of LINUX, design principles, kernel, process management and
scheduling, file systems installing requirement, basic architecture of UNIX/Linux system, Kernel,
Shell Commands for files and directories cd, cp, mv, rm, mkdir, more, less, creating and viewing
files, using cat, file comparisons, View files, disk related commands, checking disk free spaces,
Essential linux commands.
Understanding shells, Processes in linux – process fundamentals, connecting processes with pipes,
Redirecting input output, manual help, Background processing, managing multiple processes,
changing process priority, scheduling of processes at command, batch commands, kill, ps, who,
sleep, Printing commands, grep, fgrep, find, sort, cal, banner, touch, file, file related commands – ws,sat, cut, grep, dd, etc. Mathematical commands – bc, expr, factor, units. Vi, joe, vim editor
Topic covers:
what is operating system?
need of operating system
Loading of operating system
types of operating system?
Functions of operating system?
System Security Plan?
Hardening of operating system
UNIT I OPERATING SYSTEM OVERVIEW
Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory Hierarchy, Cache Memory, Direct Memory Access, Multiprocessor and Multicore Organization. Operating system overview-objectives and functions, Evolution of Operating System.- Computer System Organization Operating System Structure and Operations- System Calls, System Programs, OS Generation and System Boot.
This Tutorial will provide you information on working of operating system. Main topics are following and further sub-topics are discussed in detail.
1. Kernel Architecture.
2. Initialization of operating system.
3. Process of operating system.
4. Management in operating system.
5. File system.
6.Security in operating system.
7.Interface in operating System.
Operating System Concepts PresentationNitish Jadia
Operating System Concepts was presented by Nitish Jadia in Bhopal null meet, to make people aware of the internal workings of the OS they use.
The contents and explanation of this PPT was inspired and taken from Operating System Concepts by by silberschatz galvin gagne.
Unit I (8 Hrs)
Introduction to System Software , Overview of all system software’s: Operating system
I/O manager, Assembler, Compiler, Linker ,Loader.
Introductory Concepts: Operating system functions and characteristics, historical evolution
of operating systems, Real time systems, Distributed systems.
Unit II (8 Hrs)
Operating Systems: Methodologies for implementation of O/S service system calls,
system programs, Interrupt mechanisms.
Process - Concept of process and threads, Process states, Process management, Context
switching
Interaction between processes and OS Multithreading Process Control, Job schedulers,
Job Scheduling, scheduling criteria, scheduling algorithms
Unit III (8 Hrs)
Concurrency Control : Concurrency and Race Conditions, Mutual exclusion requirements
Software and hardware solutions, Semaphores, Monitors, Classical IPC problems and
solutions.
Deadlock : Characterization, Detection, Recovery, Avoidance and Prevention.
Unit IV (8 Hrs)
Memory management: Contiguous and non-contiguous, Swapping, Paging, Segmentation
and demand Paging, Virtual Memory, Management of Virtual memory: allocation, fetch and
replacement
Unit V (8 Hrs)
File Management: Concept, Access methods, Directory Structure, Protection, File System
implementation, Directory Implementation, Allocation methods, Free Space management,
efficiency and performance
IO systems: disk structure, disk scheduling, disk management.
Unit VI (8 Hrs)
Case Study of Linux: Structure of LINUX, design principles, kernel, process management and
scheduling, file systems installing requirement, basic architecture of UNIX/Linux system, Kernel,
Shell Commands for files and directories cd, cp, mv, rm, mkdir, more, less, creating and viewing
files, using cat, file comparisons, View files, disk related commands, checking disk free spaces,
Essential linux commands.
Understanding shells, Processes in linux – process fundamentals, connecting processes with pipes,
Redirecting input output, manual help, Background processing, managing multiple processes,
changing process priority, scheduling of processes at command, batch commands, kill, ps, who,
sleep, Printing commands, grep, fgrep, find, sort, cal, banner, touch, file, file related commands – ws,sat, cut, grep, dd, etc. Mathematical commands – bc, expr, factor, units. Vi, joe, vim editor
Topic covers:
what is operating system?
need of operating system
Loading of operating system
types of operating system?
Functions of operating system?
System Security Plan?
Hardening of operating system
UNIT I OPERATING SYSTEM OVERVIEW
Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory Hierarchy, Cache Memory, Direct Memory Access, Multiprocessor and Multicore Organization. Operating system overview-objectives and functions, Evolution of Operating System.- Computer System Organization Operating System Structure and Operations- System Calls, System Programs, OS Generation and System Boot.
This Tutorial will provide you information on working of operating system. Main topics are following and further sub-topics are discussed in detail.
1. Kernel Architecture.
2. Initialization of operating system.
3. Process of operating system.
4. Management in operating system.
5. File system.
6.Security in operating system.
7.Interface in operating System.
Introduction Oracle Database 11g Release 2 for developersLucas Jellema
"This presentations provides an overview of the most striking new functionality in Oracle Database 11g Release 2, as seen through the eyes of (database) developers. The presentation introduces new analytical functionality, the successor to the connect by clause for hierarchical queries, parallel statement execution, new packages and especially: Edition Based Redefinition. This presentation was performed (with live demos) during the AMIS Query on 29th September 2009.
This is the presentation I gave on Linux kernel modules at the Linux Meetup in Austin, TX, on 2/5/2015.
http://www.meetup.com/linux-85/events/185946802/
Code referred to in the presentation: https://github.com/ereyes01/kernel-mod-prez
We are happy to announce that a new Scan&Paint version 2.0 is released!
Scan&Paint 2.0 has many additional functions. With grid calculation method the results become more stable. The ability of connecting 2 reference sensors gives an opportunity to use Scan&Paint 2.0 for Transfer Path Analysis measurements and Operational Defection Shapes measurements. Reactivity error function displays the estimation of the uncertainty that reactivity index and the phase mismatch of Microflown and pressure sensor introduce in the intensity measurement. Graphic display has new options, such as power spectrogram analysis, harmonic cursor, double cursor analysis and much more. The release-note will widely explain new features of this Scan&Paint version.
If you have any questions, don't hesitate to contact us.
Introducing Co3's Security Incident Response ModuleResilient Systems
In response to customer demand, we recently added a security incident response module (S-IR) to Co3. This expands the scope of our solution beyond privacy breaches, to include all types of security incidents like system intrusions, malware outbreaks, and DDoS attacks. As a result Co3 can now automate incident response for all kinds of events, including of course, those that impact personally identifiable information.
As you know, we don't typically do product-oriented webinars. But since many of you have expressed interest in learning more about the S-IR module we are going to give it a try.
This webinar will demonstrate the new release of the Co3 platform, including the S-IR module. Privacy professionals will get a hot-off-the-presses look at this major update to our solution and will see how the S-IR module allows them to work more effectively with their counterparts in IT. Security professionals will get an introduction to a game-changing security product which Network World recently named, "One of the hottest products at RSA."
I/O System and Case Study of Operating System its easy way to find how the I/O's are connected with the Operating System and And the mechanism of the Operating System
This PowerPoint Presentation will help the students of Class - 9 to revise the concept that How a Computer works, What is the basic organization of a Computer and so on. It will help the students to clear their doubts and score good marks in examination
An operating system is a program that manages the computer hardware. It also provides a basis for application programs and act as an intermediary between a user of a computer and the computer hardware. It controls and coordinates the use of the hardware among the various application programs for the various users.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
6. Hardware Architecture
(Bus-based)
CPU
Arithmetric-Logic Unit Secondary
Input Devices
Control Unit Storage
... ... ... ...
... ... ... ...
... ... ... ...
Communication
BUS
Output Devices
Devices
... ... ... ...
... ... ... ...
... ... ... ...
Primary Storage
Guo, Xunhua 6
7. Hardware components
Central Processing Unit (CPU)
Control Unit
Arithmetic-Logic Unit
Storage
Primary Storage
Secondary Storage
Input/Output Devices (Including
Communication Devices)
Guo, Xunhua 7
8. Computer hardware operation
M t or
oni
Bus
I/O devices and the CPU can execute concurrently.
Each device controller is in charge of a particular device type.
Each device controller has a local buffer.
CPU moves data from/to main memory to/from the local buffers.
I/O is from the device to local buffer of controller.
Device controller informs CPU that it has finished its operation by
causing an interrupt.
Guo, Xunhua 8
9. Common Functions of Interrupts
Interrupt transfers control to the interrupt service
routine
interrupt vector contains the addresses of all the
service routines.
Interrupt architecture must save the address of the
interrupted instruction.
Incoming interrupts are disabled while another
interrupt is being processed to prevent a lost
interrupt.
A trap is a software-generated interrupt caused
either by an error or a user request.
An operating system is interrupt driven.
Guo, Xunhua 9
10. Interrupts
(a) (b)
(a) Steps in starting an I/O device and getting
interrupt
(b) How the CPU is interrupted
Guo, Xunhua 10
12. Synchronous I/O interrupts
After I/O starts,
control returns to user
program only upon I/O
completion.
wait instruction idles
the CPU until the next
interrupt.
wait loop (contention
for memory access).
at most one I/O request
is outstanding at a
time; no simultaneous
I/O processing.
Guo, Xunhua 12
13. Asynchronous I/O interrupts
After I/O starts, control returns to
user program without waiting
System call – request to the
operating system
Device-status table contains
entry for each I/O device
indicating its type, address,
and state (not functioning,
idle or busy)
Multiple requests for the
same device are maintained
in a wait queue.
Operating system indexes
into I/O device table to
determine device status and
to modify table entry to
include interrupt.
Guo, Xunhua 13
14. DMA Structure
Used for high-speed I/O devices able to
transmit information at close to memory
speeds.
Device controller transfers blocks of data
from buffer storage directly to main
memory without CPU intervention.
Only one interrupt is generated per block,
rather than the one interrupt per byte.
Guo, Xunhua 14
15. Storage Structure
Main memory
The only large storage media that the CPU can
access directly.
Secondary storage
extension of main memory that provides large
nonvolatile storage capacity.
Magnetic disks
Optical disks
Magnetic tapes
Guo, Xunhua 15
16. Typical memory hierarchy
Storage systems organized in hierarchy:
Speed, cost, volatility
Caching
copying information into faster storage system;
main memory can be viewed as a fast cache for
secondary storage.
Guo, Xunhua 16
19. Dual-mode operation
Sharing system resources requires
operating system to ensure that an
incorrect program cannot cause other
programs to execute incorrectly.
Provide hardware support to differentiate
between at least two modes of operations.
User mode – execution done on behalf of a user.
Monitor mode (also supervisor mode, kernel
mode, or system mode) – execution done on
behalf of operating system.
Guo, Xunhua 19
21. User mode and monitor mode
Mode bit added to computer hardware to indicate the
current mode
monitor (0) or user (1).
When an interrupt or fault occurs hardware switches to
monitor mode
Privileged instructions can be issued only in monitor
mode.
Guo, Xunhua 21
22. I/O protection
All I/O instructions are privileged
instructions.
Must ensure that a user program could
never gain control of the computer in
monitor mode
i.e., a user program that, as part of its
execution, stores a new address in the interrupt
vector
Guo, Xunhua 22
23. Memory protection
Must provide memory protection at least for
the interrupt vector and the interrupt
service routines.
In order to have memory protection, add
two registers that determine the range of
legal addresses a program may access:
base register – holds the smallest legal physical
memory address.
limit register – contains the size of the range.
Memory outside the defined range is
protected.
Guo, Xunhua 23
28. System calls
The method used by a process to request
action by the operating system.
Usually takes the form of a trap to a
specific location in the interrupt vector.
Control passes through the interrupt vector
to a service routine in the OS, and the
mode bit is set to monitor mode.
The monitor verifies that the parameters
are correct and legal, executes the request,
and returns control to the instruction
following the system call.
Guo, Xunhua 28
29. System calls
System calls provide the interface between
a running program and the operating
system.
Three general methods are used to pass
parameters between a running program
and the operating system:
Pass parameters in registers.
Store the parameters in a table in memory, and
the table address is passed as a parameter in a
register.
Push (store) the parameters onto the stack by
the program, and pop off the stack by the
operating system.
Guo, Xunhua 29
37. System (utility) programs
Solve common problems or perform
common operations
File manipulation: e.g., cp, mv, chmod, ls
Status information: e.g., date, ps, df
File modification: e.g., vi
Programming-language support: e.g., gcc, asm
Program loading and execution: e.g., ld, gdb
Communications: e.g., telnet
System programs are invoked from the
shell whereas system calls are invoked
from programs.
Guo, Xunhua 37
40. Common system components
Process Management
Main-Memory Management
File Management
I/O System Management
Protection System
Networking
Command-Interpreter System
Guo, Xunhua 40
41. Process management
program (passive) vs. process (active)
A process is a program in execution. A process needs
certain resources, including CPU time, memory, files,
and I/O devices, to accomplish its task.
The operating system is responsible for:
process creation and deletion.
process suspension and resumption.
provision of mechanisms for:
process synchronization
process communication
Deadlock handling
Guo, Xunhua 41
42. Main memory management
Memory is a large array of words or bytes,
each with its own address.
It is a repository of quickly accessible data
shared by the CPU and I/O devices.
Main memory is a volatile storage device
The operating system is responsible for:
Keep track of which parts of memory are
currently being used and by whom.
Decide which processes to load when memory
space becomes available.
Allocate and deallocate memory space as
needed.
Guo, Xunhua 42
43. File Management
The OS through the file system provides a
uniform logical view of information storage.
The operating system is responsible for:
File creation and deletion.
Directory creation and deletion.
Support of primitives for manipulating files and
directories.
Mapping files onto secondary storage.
File backup on stable (nonvolatile) storage
media.
Guo, Xunhua 43
44. I/O system management
The peculiarities of the various I/O devices
are hidden from the bulk of the operating
system itself by the I/O subsystem
The I/O system consists of:
A buffer-caching system
A general device-driver interface
Drivers for specific hardware devices
Guo, Xunhua 44
45. Secondary-Storage Management
Most modern computer systems use disks
as the principle on-line storage medium, for
both programs and data.
The operating system is responsible for:
Free-space management
Storage allocation
Disk scheduling
Guo, Xunhua 45
46. Protection system
Protection refers to a mechanism for
controlling access by programs, processes,
or users to both system and user resources.
The protection mechanism must:
distinguish between authorized and
unauthorized usage.
specify the controls to be imposed.
provide a means of enforcement.
Guo, Xunhua 46
47. Networking
A distributed system is a collection of
processors that do not share memory or a
clock. Each processor has its own local
memory.
The processors in the system are connected
through a communication network.
A distributed system provides user access
to various system resources.
Computation speed-up
Increased data availability
Enhanced reliability
Guo, Xunhua 47
48. Command-Interpreter System
User interface which deals with:
process creation and management
I/O handling
secondary-storage management
main-memory management
file-system access
protection
Networking
Command-line and GUI
Guo, Xunhua 48
49. Common system components
Process Management
Main-Memory Management
File Management
I/O System Management
Protection System
Networking
Command-Interpreter System
Guo, Xunhua 49
55. Basic characteristics of modern
operating systems
Concurrency ( 并发 )
Sharing ( 共享 )
Virtualization ( 虚拟 )
Asynchronism ( 异步 )
Guo, Xunhua 55
56. Concurrency
Concurrency
Several events take places in a same time
period
Several programs (processes) run in the same
time
A modern operating system is a
concurrency system
The co-existence of multi events and processes
is managed by the OS
Guo, Xunhua 56
57. Sharing
Sharing: several processes share the
limited computer system resource
An OS shall manage the system resource for
proper sharing
Resources are used alternatively by multi
processes
Exclusive sharing: e.g. printers
Non-exclusive sharing: e.g. harddisks
Guo, Xunhua 57
58. Virtualization
Virtualization:
A physical entity is map to several logical
entities with time or space
An important way to improve the utilization
effectiveness of resources
Virtual processor
Virtual storage
Virtual device
Guo, Xunhua 58
60. Asynchronism
Conditions
Several processes execute concurrently
The execution sequence and time of processes
are uncertain
The speed of process execution is not pre-
determined
Target
No matter how the processes are executed, the
results must be the sam
Guo, Xunhua 60
61. Exercises
Reading:
Chapter 2 and 3, Textbook
Questions:
Why is the distinction between monitor mode
and user mode important?
What are different between system calls and
library functions?
Guo, Xunhua 61