1. The document provides an overview of the history and development of UNIX/Linux operating systems. It originated from projects in the 1960s and was further developed by Ken Thompson, Dennis Ritchie and others.
2. UNIX became popular due to its modular design, use of a hierarchical file system, treating all system resources as files, and ability to combine simple programs together.
3. The basic architecture of UNIX involves application programs interacting with the kernel via system calls to perform tasks like process and memory management.
The components of an operating system all exist in order to make the different parts of a computer work together. All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet component.
Overview - Functions of an Operating System – Design Approaches – Types of Advanced
Operating System - Synchronization Mechanisms – Concept of a Process, Concurrent
Processes – The Critical Section Problem, Other Synchronization Problems – Language
Mechanisms for Synchronization – Axiomatic Verification of Parallel Programs - Process
Deadlocks - Preliminaries – Models of Deadlocks, Resources, System State – Necessary and
Sufficient conditions for a Deadlock – Systems with Single-Unit Requests, Consumable
Resources, Reusable Resources.
This presentation gives a brief introduction on the following topics:
Definition
Objectives of Operating System
Structure of Operating System
Need for Operating Systems
OS Components and Functions
OS Services
Types of Operating Systems
Examples of Operating Systems
The components of an operating system all exist in order to make the different parts of a computer work together. All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet component.
Overview - Functions of an Operating System – Design Approaches – Types of Advanced
Operating System - Synchronization Mechanisms – Concept of a Process, Concurrent
Processes – The Critical Section Problem, Other Synchronization Problems – Language
Mechanisms for Synchronization – Axiomatic Verification of Parallel Programs - Process
Deadlocks - Preliminaries – Models of Deadlocks, Resources, System State – Necessary and
Sufficient conditions for a Deadlock – Systems with Single-Unit Requests, Consumable
Resources, Reusable Resources.
This presentation gives a brief introduction on the following topics:
Definition
Objectives of Operating System
Structure of Operating System
Need for Operating Systems
OS Components and Functions
OS Services
Types of Operating Systems
Examples of Operating Systems
This ppt discusses the history of both the operating systems & compares both of them in terms of Kernel, memory management, GUI and application support.
Linux Memory Management
1.Memory Structure of Linux OS.
2.How Program is loaded into the memory.
3.Address Translation.
4.Feature for Multithreading and Multiprocessing.
Getting started with setting up embedded platform requires audience to understand some of the key aspects of Linux. This presentation deals with basics of Linux as an OS, Linux commands, vi editor, Shell features like redirection, pipes and shell scripting
Part 01 Linux Kernel Compilation (Ubuntu)Tushar B Kute
Presentation on "Linux Kernel Compilation" (Ubuntu based).
Presented at Army Institute of Technology, Pune for FDP on "Basics of Linux Kernel Programming". by Tushar B Kute (http://tusharkute.com).
What is Soft Computing ? Difference between Soft Computing and Hard Computing. Classical Sets ,operations on classical sets ,Properties of classical sets
This ppt discusses the history of both the operating systems & compares both of them in terms of Kernel, memory management, GUI and application support.
Linux Memory Management
1.Memory Structure of Linux OS.
2.How Program is loaded into the memory.
3.Address Translation.
4.Feature for Multithreading and Multiprocessing.
Getting started with setting up embedded platform requires audience to understand some of the key aspects of Linux. This presentation deals with basics of Linux as an OS, Linux commands, vi editor, Shell features like redirection, pipes and shell scripting
Part 01 Linux Kernel Compilation (Ubuntu)Tushar B Kute
Presentation on "Linux Kernel Compilation" (Ubuntu based).
Presented at Army Institute of Technology, Pune for FDP on "Basics of Linux Kernel Programming". by Tushar B Kute (http://tusharkute.com).
What is Soft Computing ? Difference between Soft Computing and Hard Computing. Classical Sets ,operations on classical sets ,Properties of classical sets
This slide explores the basics of UNIX operating system - What's UNIX? What are different types of UNIX OS? What is difference between UNIX and Linux? and much more..
What is a Kernel? : Introduction And Architecturepec2013
An Assembly car that has all stuffs except exteriors.This assembly is responsible for the movement of car and various other functions but we cannot travel in it as it has no seats or exteriors.
This assembly is analogous to kernel. Without it operating system is nothing. More formally, we can also call kernel a type of micro OS that handles all the very important functions.
While the main OS contains various other functions and kernel in the same way the car has shafts and tyres for rotations.
This presentation covers the understanding of system calls for various resource management and covers system calls for file management in details. The understanding of using system calls helps to start with working with device driver programming on Unix/Linux OS.
operating system calls input and output by (rohit malav)Rohit malav
Introduction of System Call
In computing, a system call is the programmatic way in which a computer program requests a service from the kernel of the operating system it is executed on. A system call is a way for programs to interact with the operating system. A computer program makes a system call when it makes a request to the operating system’s kernel. System call provides the services of the operating system to the user programs via Application Program Interface(API). It provides an interface between a process and operating system to allow user-level processes to request services of the operating system. System calls are the only entry points into the kernel system. All programs needing resources must use system calls.
Services Provided by System Calls :
Process creation and management
Main memory management
File Access, Directory and File system management
Device handling(I/O)
Protection
Networking, etc.
An introduction to Linux Container, Namespace & Cgroup.
Virtual Machine, Linux operating principles. Application constraint execution environment. Isolate application working environment.
Chorus - Distributed Operating System [ case study ]Akhil Nadh PC
ChorusOS is a microkernel real-time operating system designed as a message-based computational model. ChorusOS started as the Chorus distributed real-time operating system research project at Institut National de Recherche en Informatique et Automatique (INRIA) in France in 1979. During the 1980s, Chorus was one of two earliest microkernels (the other being Mach) and was developed commercially by Chorus Systèmes. Over time, development effort shifted away from distribution aspects to real-time for embedded systems.
Similar to Chapter 1: Introduction to Unix / Linux Kernel (20)
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2. Prerequisites:
1. Working knowledge of C programming.
2. Basic Computer Architecture concepts.
3. Basic algorithms and data structure concepts.
3. Prof.Prasad Sawant
,Assitiant Professor
,Dept. Of CS PCCCS
Chichwad
History
• 1965, AT&T Bell Lab & GE (General Electric Company) &
Project MAC of MIT : Multics
• Ken Thompson & Dennis Ritchie :UNICS
• 1971, UNIX was tried on more powerful machine PDP-1
• 1972, Dennis Ritchie developed ‘C’ language
• 1977, it was first ported (or say installed) on Non-PDP
machine called Interdata 8/32.
• 1982, AT&T itself created UNIX System III (for commercial
purpose), UNIX System IV (only for its internal use)
• Jan 1983, the UNIX System V Last Version
• Due to availability of source code, University California in
Berkeley, developed their own UNIX standard for VAX
machine, which was called as UNIX 4.3 BSD (Berkeley
Software Distribution).
•
4. Prof.Prasad Sawant
,Assitiant Professor
,Dept. Of CS PCCCS
Chichwad
Why Unix is popular
• easy to read, easy to understand, easy to move to other machines.
• It has easy user interface,
• Complex programs can be built by combining existing simple programs
(obviously by using pipe).
• It uses Hierarchical file system, which is easy to maintain & implement.
• In UNIX, everything storable is “file”, means device, terminals, even
directories are also files. UNIX considers “file” as stream of byte.
Thus system programming becomes easy.
• It is Multi-user, Multi-tasking, Multi-threading operating system.
• It hides hardware (i.e. machine architecture) from the programmer & end
user.
• Though system was written in C, it provides environmental support to
other languages like Basic, Fortran, Pascal, ADA, Cobol, Lisp, Prolog,
C++, Java, etc.
6. Prof.Prasad Sawant
,Assitiant Professor
,Dept. Of CS PCCCS
Chichwad
• This interaction (i.e. communication of application
program with the Kernel) is done by a set of functions
known as System Calls. In UNIX System Release V,
there are such 64 system calls, out of which 32 system
calls are sued much frequently.
•
7. Prof.Prasad Sawant
,Assitiant Professor
,Dept. Of CS PCCCS
Chichwad
Features
• The high-level features of UNIX system, mainly includes
3 points :
• The File System.
• The Processing Environment.
• The Building Block Primitives.
9. Prof.Prasad Sawant
,Assitiant Professor
,Dept. Of CS PCCCS
Chichwad
Characteristics
▫ A hierarchical (i.e. tree like) structure.
▫ Consistent treatment to file data (i.e. all files are
stream of bytes).
▫ Ability to create new & to delete old files.
▫ Dynamic growth of files.
▫ The protection of file data (by access permissions)
▫ Peripheral devices & directories are also
considered as files.
•
10. Prof.Prasad Sawant
,Assitiant Professor
,Dept. Of CS PCCCS
Chichwad
• “Files in UNIX are unformatted stream of bytes” and
system treats them with same system calls assessment.
• Thus “copy oldfile newfile” command will
operate on any type of file, whether it is a regular file
or directory file or device file.
•
11. Processing Environment
• A program is an executable file, and a process is an instance of
the program in execution .Many process can execute
simultaneously on UNIX system with no logical limit to their
number ,and many instances of a program can exist
simultaneously in the system .
12. Prof.Prasad Sawant
,Assitiant Professor
,Dept. Of CS PCCCS
Chichwad
• The major 4 system calls for process management are
fork ( ),
• exec ( ),
• wait ( ) and
• exit ( ), where fork ( ) is used to create a new process,
exec ( ) is used to execute the new process, wait ( ) is
used to allow the old process to wait for the completion
of the execution of new process and exit ( ) is used for
exiting the program
13. Prof.Prasad Sawant
,Assitiant Professor
,Dept. Of CS PCCCS
Chichwad
• When exec ( ) executes a child process, the child
process overlaps (or more precisely overlays) the
address space (memory) of parent process. And thus
there remains no memory for parent process to run, thus
parent process must wait for the completion of execution
of child.
14. User Perspective
• the fork system call to create a
new process. The new process,
called the child process, gets a 0
return value from fork and
invokes execl
• The execl call overlays the address
space of the child process with the
file "copy“.
• If the execl call succeeds, it never
returns because the process executes
in a new address space meanwhile,
the process that had invoked fork (the
parent) receives a non-0 return from
the call, calls wait:, suspending its
execution until copy finishes, prints
the message "copy done," and exits
15. User perspective: Shell
• The shell allows three types of commands.
• First, a command can be an executable file that contains object code
produced by compilation of source code (a C program for example).
• Second, a command can be an executable file that contains a sequence of
shell command lines
• The internal commands make the shell a programming language in
addition to a command interpreter and include commands for looping
16. User Perspective :
Building Block Primitives
• redirect I/O
• Processes conventionally have access to three files: they read
from their standard input file, write to their standard output
file, and write error messages to their standard error file.
17. User Perspective :
Building Block Primitives
• Pipe
• The pipe, a mechanism that allows a stream of data to be
passed between reader and writer processes. Processes can
redirect their standard output to a pipe to be read by other
processes that have redirected their standard input to come
from the pipe.
• The data that the first processes write into the pipe is the input
for the second processes. The second processes could also
redirect their output, and so on, depending on programming
need. Again, the processes need not know what type of file
their standard output is;they work regardless of whether
their standard output is a regular file, a pipe, or a device
18. Operating System Functions
▫ Process creation, termination, suspension and
inter-process communication.
▫ CPU scheduling for multiple processes in “time-
shared” manner. (here it is assumed that system
has one CPU)
▫ Memory allocation (either by swapping or paging)
for executing process/processes.
▫ File I/O, by creating file system.
▫ Insulates processes from hardware of the machine.
19. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Assumptions about h/w
• A process (i.e. running program) runs in two modes : - Kernel
Mode & User Mode.
• Kernel Mode : When a process makes a system call, then
it said that, now the process is running in Kernel Mode.
• User Mode : When the process is doing operations like
assignments, comparisons, looping, then it is said that, now the
process is running in User Mode.
20. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Interrupts :
• While handing the interrupts, Kernel gives first preference to
high priority interrupts and then to low priority interrupts.
• The priority of the interrupt is usually decided by the hardware
itself.
21. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Exceptions :
• Exception is an un-excepted event caused by a process. E.g. –
Addressing illegal memory by using pointer, execution of un-
allowed instruction (like dividing by 0) etc.
• Interrupts occur by the events which are external to the process
while exception occurs “in the middle” of the process due to
code instruction.
• It is also said that, interrupt occurs between the two
instructions and exception occurs at the instruction (obviously
at illegal instruction).
• For interrupt, system starts the next instruction normally after
handling the interrupt.
• But for exception, system handles the exception, and then
either re-starts the same instruction
22. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Processor Execution Level
• If a processor execution level is set to “Disk Interrupt
Level” (see in figure), then only “System Clock” &
“Machine Error” interrupts are processed and remaining
all lower level interrupts (including the set level) are
prevented
• During & Critical Activity
• Privileged Instructions :
23. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Memory Management :
• If sufficient memory is available, then Kernel can assign
memory to the program’s process by methods of
memory management, like swapping or demand paging.
25. Assumptions about Hardware
user VS kernel
1. Processes in user mode can access their own instructions and
data but not kernel instructions and data (or those of other
processes). Processes in kernel mode,however, can access
kernel and user addresses.
2. Some machine instructions are privileged and result in an
error when executed in user mode.
26. Concepts of Linux Programming
Files and the File system
1. The file is the most basic and fundamental abstraction in Linux. Linux
follows the everything-is-a-file
2. In order to be accessed, a file must first be opened. Files can be opened for
reading, writing, or both
3. An open file is referenced via a unique descriptor, a mapping from the
metadata associated with the open file back to the specific file itself. Inside
the Linux kernel, this descriptor is handled by an integer (of the C type int)
called the file descriptor, abbreviated fd.
27. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Files and the Filesystem
• Regular files
• What most of us call “files” are what Linux labels regular files. A regular file contains
bytes of data, organized into a linear array called a byte stream. In Linux, no further
organization or formatting is specified for a file.
• Directories and links
• Accessing a file via its inode number is cumbersome so files are always opened
from user space by a name, not an inode number.
• Directories are used to provide the names with which to access files. A directory
acts
• as a mapping of human-readable names to inode numbers. A name and inode pair
is
• called a link. The physical on-disk form of this mapping a simple table, a hash, or
• Whatever is implemented and managed by the kernel code that supports a given
• filesystem. Conceptually, a directory is viewed like any normal file, with the
difference
• that it contains only a mapping of names to inodes. The kernel directly uses this
• mapping to perform name-to-inode resolutions.
28. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Files and the File system
• Hard links
• Conceptually, nothing covered thus far would prevent multiple names
resolving to the same inode. Indeed, this is allowed. When multiple
links map different names to the same inode, we call them hard links.
• Hard links allow for complex filesystem structures with multiple
pathnames pointing to the same data. The hard links can be in the
same directory, or in two or more different directories.
29. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Files and the File system
• Symbolic links
• Hard links cannot span filesystems because an inode number is
meaningless outside of the inode’s own filesystem. To allow
links that can span filesystems, and that are a bit simpler and
less transparent, Unix systems also implement symbolic links
(often shortened to symlinks).
• Symbolic links look like regular files. A symlink has its own
inode and data chunk, which contains the complete pathname
of the linked-to file. This means symbolic links can point
anywhere, including to files and directories that reside on
different filesystems, and even to files and directories that do
not exist. A symbolic link that points to a nonexistent file is
called a broken link.
30. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Users and Groups
• Authorization in Linux is provided by users and groups. Each user is
associated with a unique positive integer called the user ID (uid). Each
process is in turn associated with exactly one uid, which identifies the user
running the process, and is called the process’ real uid. Inside the Linux
kernel, the uid is the only concept of a user. Users themselves, however,
refer to themselves and other users through usernames, not numerical values.
Usernames and their corresponding uids are stored in /etc/passwd, and
library routines map user-supplied usernames to the corresponding uids.
32. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Signals
• Signals are a mechanism for one-way asynchronous
notifications. A signal may be sent from the kernel to a
process, from a process to another process, or from a
process to itself. Signals typically alert a process to
some event, such as a segmentation fault, or the user
pressing Ctrl-C.
33. Prof.Prasad Sawant ,Assitiant Professor ,Dept. Of CS PCCCS Chichwad
Inter process Communication
• Allowing processes to exchange information and notify
each other of events is one of an operating system’s
most important jobs.