Page 1
CHAPTER 5
(Operating System)
Page 2
• OS is an example of
system software –
software that controls
the system’s hardware,
and which interacts
with the user and
application software.
• In short, the operating
system is the
computer’s master
control program.
OPERATING SYSTEM
Page 3
THE OPERATING SYSTEM PERFORMS
THE FOLLOWING FUNCTIONS
• Provides the instructions to display the on-screen
elements with which you interact. Collectively, these
elements are known as the user interface.
• Loads programs (such as word processing and
spreadsheet programs) into the computer’s memory
so that you can use them.
• Coordinates how programs work with the CPU, RAM,
Keyboard, mouse, printer, and other hardware, as
well as with other software.
• Manages the way information is stored on the
received from disks.
Page 4
OPERATING SYSTEMS CYCLE
Page 5
RUNNING PROGRAMS
• The operating system
provides a consistent
interface between those
programs and other
computer resources such
as memory, a printer, or
another program.
• Programmers write
computer programs with
built – in instructions –
called SYSTEM CALLS – that
request services from the
operating system.
Page 6
Page 7
EXAMPLES OF
OPERATING SYSTEM
Page 8
MICROSOFT WINDOWS
• Microsoft Windows is a
family of proprietary
operating systems most
commonly used on
personal computers.
• It is the most common
family of operating
systems for the
personal computer,
with about 90% of the
market share
Page 9
• Ken Thompson wrote B,
mainly based on BCPL,
which he used to write
Unix, based on his
experience in the MULTICS
project.
• B was replaced by C, and
Unix developed into a
large, complex family of
inter-related operating
systems which have been
influential in every
modern operating system
UNIX / LINUX
Page 10
BSD / DESCENDANTS
• A subgroup of the Unix
family is the
Berkeley Software Distribution
family, which includes
FreeBSD, NetBSD, and
OpenBSD.
• These operating systems
are most commonly
found on webservers,
although they can also
function as a personal
computer OS.
Page 11
MAC / OS
• Mac OS X is a line of
partially proprietary
graphical operating
systems developed,
marketed, and sold
by Apple Inc., the
latest of which is pre-
loaded on all
currently shipping
Macintosh computers.
Page 12
CONTINUATION:
• Mac OS X is the successor to the original
Mac OS, which had been Apple's primary
operating system since 1984.
• Unlike its predecessor, Mac OS X is a UNIX
operating system built on technology that
had been developed at NeXT through the
second half of the 1980s and up until Apple
purchased the company in early 1997
Page 13
PLAN 9
• Programmers at
Bell Labs went on to
develop Plan 9 and
Inferno, which were
engineered for
modern distributed
environments.
Page 14
• Plan 9 was designed from the start to be a
networked operating system, and had
graphics built-in, unlike Unix, which added
these features to the design later.
• It is currently released under the
Lucent Public License. Inferno was sold to
Vita Nuova Holdings and has been released
under a GPL/MIT license.
CONTINUATION:
Page 15
LINUX AND GNU
• Linux is the generic name
for a UNIX like operating
system that can be used on
a wide range of devices
from supercomputers to
wristwatches. The Linux
kernel is released under
an open source license, so
anyone can read and
modify its code. It has
been modified to run on a
large variety of electronics
Page 16
GOOGLE CHROME OS
• Chrome is an O.S. based on
the Linux kernel and
designed by Google. Chrome
targets computer users that
spend most of their time on
the internet—it is technically
only a web browser with no
other applications, and relies
on internet applications used
in the web browser to
accomplish tasks such as
word processing and media
viewing.
Page 17
COMPONENTS OF AN
OPERATING SYSTEM
Page 18
USER INTERFACE
• Computer receives some
sort of human input
needs a user interface,
which allows a person
to interact with the
computer. While devices
like keyboards, mice
and touch screens make
up the hardware end of
this task, the user
interface makes up the
software for it.
Page 19
CONTINUATION:
• The two most common forms of a user
interface have historically been the
Command-line interface, where computer
commands are typed out line-by-line, and
the Graphical user interface, where a visual
environment (most commonly with windows,
buttons, and icons) is
Page 20
GRAPHICAL USER INTERFACES
• Most of the modern
computer systems support
graphical user interfaces
(GUI), and often include
them.
• In some computer
systems, such as the
original implementations
of Microsoft Windows and
the Mac OS, the GUI is
integrated into the kernel
.
Page 21
THE KERNEL
• With the aid of the
firmware and
device drivers, the
operating system
provides the most
basic level of
control over all of
the computer's
hardware devices.
Page 22
CONTINUATION:
• It manages memory access for programs in
the RAM, it determines which programs get
access to which hardware resources, it sets
up or resets the CPU's operating states for
optimal operation at all times, and it
organizes the data for long-term
non-volatile storage with file systems on such
media as disks, tapes, flash memory, etc.
Page 23
PROGRAM EXECUTION
• The operating system acts as an interface between
an application and the hardware. The user
interacts with the hardware from "the other
side".
• The operating system is a set of services which
simplifies development of applications. Executing
a program involves the creation of a process by
the operating system. The kernel creates a
process by assigning memory and other
resources, establishing a priority for the process
(in multi-tasking systems), loading program code
into memory, and executing the program.
Page 24
INTERRUPTS
• Interrupts are central to operating systems,
as they provide an efficient way for the
operating system to interact with and react
to its environment.
• Interrupt-based programming is directly
supported by most modern CPUs. Interrupts
provide a computer with a way of
automatically saving local register contexts,
and running specific code in response to
events
Page 25
MODES
• Modern CPUs support
multiple modes of
operation.
• CPUs with this
capability use at least
two modes: protected
mode and supervisor
mode.
Page 26
CONTINUATION:
• The supervisor mode is used by the
operating system's kernel for low level tasks
that need unrestricted access to hardware,
such as controlling how memory is written
and erased, and communication with
devices like graphics cards.
• Protected mode, in contrast, is used for
almost everything else.
Page 27
MEMORY MANAGEMENT
• System of memory management is almost never
seen anymore, since programs often contain
bugs which can cause them to exceed their
allocated memory.
• If a program fails it may cause memory used by
one or more other programs to be affected or
overwritten. Malicious programs, or viruses may
purposefully alter another program's memory or
may affect the operation of the operating system
itself. With cooperative memory management it
takes only one misbehaved program to crash the
system.
Page 28
VIRTUAL MEMORY
• The use of virtual
memory addressing
(such as paging or
segmentation) means
that the kernel can
choose what memory
each program may use
at any given time,
allowing the operating
system to use the same
memory locations for
multiple tasks.
Page 29
DEVICE DRIVER
• A device driver is a specific type of computer
software developed to allow interaction with
hardware devices.
• Typically this constitutes an interface for
communicating with the device, through the
specific computer bus or communications
subsystem that the hardware is connected to,
providing commands to and/or receiving
data from the device, and on the other end,
the requisite interfaces to the operating
system and software applications.
Page 30
NETWORKING
• Currently most operating systems support a variety of
networking protocols, hardware, and applications
for using them.
• This means that computers running dissimilar
operating systems can participate in a common
network for sharing resources such as computing,
files, printers, and scanners using either wired or
wireless connections. Networks can essentially allow
a computer's operating system to access the
resources of a remote computer to support the same
functions as it could if those resources were
connected directly to the local computer.
Page 31
SECURITY
• A computer being secure depends on a number of
technologies working properly. A modern operating
system provides access to a number of resources,
which are available to software running on the
system, and to external devices like networks via the
kernel.
• External security involves a request from outside the
computer, such as a login at a connected console or
some kind of network connection. External requests
are often passed through device drivers to the
operating system's kernel, where they can be passed
onto applications, or carried out directly.

OPERATING SYSTEM

  • 1.
  • 2.
    Page 2 • OSis an example of system software – software that controls the system’s hardware, and which interacts with the user and application software. • In short, the operating system is the computer’s master control program. OPERATING SYSTEM
  • 3.
    Page 3 THE OPERATINGSYSTEM PERFORMS THE FOLLOWING FUNCTIONS • Provides the instructions to display the on-screen elements with which you interact. Collectively, these elements are known as the user interface. • Loads programs (such as word processing and spreadsheet programs) into the computer’s memory so that you can use them. • Coordinates how programs work with the CPU, RAM, Keyboard, mouse, printer, and other hardware, as well as with other software. • Manages the way information is stored on the received from disks.
  • 4.
  • 5.
    Page 5 RUNNING PROGRAMS •The operating system provides a consistent interface between those programs and other computer resources such as memory, a printer, or another program. • Programmers write computer programs with built – in instructions – called SYSTEM CALLS – that request services from the operating system.
  • 6.
  • 7.
  • 8.
    Page 8 MICROSOFT WINDOWS •Microsoft Windows is a family of proprietary operating systems most commonly used on personal computers. • It is the most common family of operating systems for the personal computer, with about 90% of the market share
  • 9.
    Page 9 • KenThompson wrote B, mainly based on BCPL, which he used to write Unix, based on his experience in the MULTICS project. • B was replaced by C, and Unix developed into a large, complex family of inter-related operating systems which have been influential in every modern operating system UNIX / LINUX
  • 10.
    Page 10 BSD /DESCENDANTS • A subgroup of the Unix family is the Berkeley Software Distribution family, which includes FreeBSD, NetBSD, and OpenBSD. • These operating systems are most commonly found on webservers, although they can also function as a personal computer OS.
  • 11.
    Page 11 MAC /OS • Mac OS X is a line of partially proprietary graphical operating systems developed, marketed, and sold by Apple Inc., the latest of which is pre- loaded on all currently shipping Macintosh computers.
  • 12.
    Page 12 CONTINUATION: • MacOS X is the successor to the original Mac OS, which had been Apple's primary operating system since 1984. • Unlike its predecessor, Mac OS X is a UNIX operating system built on technology that had been developed at NeXT through the second half of the 1980s and up until Apple purchased the company in early 1997
  • 13.
    Page 13 PLAN 9 •Programmers at Bell Labs went on to develop Plan 9 and Inferno, which were engineered for modern distributed environments.
  • 14.
    Page 14 • Plan9 was designed from the start to be a networked operating system, and had graphics built-in, unlike Unix, which added these features to the design later. • It is currently released under the Lucent Public License. Inferno was sold to Vita Nuova Holdings and has been released under a GPL/MIT license. CONTINUATION:
  • 15.
    Page 15 LINUX ANDGNU • Linux is the generic name for a UNIX like operating system that can be used on a wide range of devices from supercomputers to wristwatches. The Linux kernel is released under an open source license, so anyone can read and modify its code. It has been modified to run on a large variety of electronics
  • 16.
    Page 16 GOOGLE CHROMEOS • Chrome is an O.S. based on the Linux kernel and designed by Google. Chrome targets computer users that spend most of their time on the internet—it is technically only a web browser with no other applications, and relies on internet applications used in the web browser to accomplish tasks such as word processing and media viewing.
  • 17.
    Page 17 COMPONENTS OFAN OPERATING SYSTEM
  • 18.
    Page 18 USER INTERFACE •Computer receives some sort of human input needs a user interface, which allows a person to interact with the computer. While devices like keyboards, mice and touch screens make up the hardware end of this task, the user interface makes up the software for it.
  • 19.
    Page 19 CONTINUATION: • Thetwo most common forms of a user interface have historically been the Command-line interface, where computer commands are typed out line-by-line, and the Graphical user interface, where a visual environment (most commonly with windows, buttons, and icons) is
  • 20.
    Page 20 GRAPHICAL USERINTERFACES • Most of the modern computer systems support graphical user interfaces (GUI), and often include them. • In some computer systems, such as the original implementations of Microsoft Windows and the Mac OS, the GUI is integrated into the kernel .
  • 21.
    Page 21 THE KERNEL •With the aid of the firmware and device drivers, the operating system provides the most basic level of control over all of the computer's hardware devices.
  • 22.
    Page 22 CONTINUATION: • Itmanages memory access for programs in the RAM, it determines which programs get access to which hardware resources, it sets up or resets the CPU's operating states for optimal operation at all times, and it organizes the data for long-term non-volatile storage with file systems on such media as disks, tapes, flash memory, etc.
  • 23.
    Page 23 PROGRAM EXECUTION •The operating system acts as an interface between an application and the hardware. The user interacts with the hardware from "the other side". • The operating system is a set of services which simplifies development of applications. Executing a program involves the creation of a process by the operating system. The kernel creates a process by assigning memory and other resources, establishing a priority for the process (in multi-tasking systems), loading program code into memory, and executing the program.
  • 24.
    Page 24 INTERRUPTS • Interruptsare central to operating systems, as they provide an efficient way for the operating system to interact with and react to its environment. • Interrupt-based programming is directly supported by most modern CPUs. Interrupts provide a computer with a way of automatically saving local register contexts, and running specific code in response to events
  • 25.
    Page 25 MODES • ModernCPUs support multiple modes of operation. • CPUs with this capability use at least two modes: protected mode and supervisor mode.
  • 26.
    Page 26 CONTINUATION: • Thesupervisor mode is used by the operating system's kernel for low level tasks that need unrestricted access to hardware, such as controlling how memory is written and erased, and communication with devices like graphics cards. • Protected mode, in contrast, is used for almost everything else.
  • 27.
    Page 27 MEMORY MANAGEMENT •System of memory management is almost never seen anymore, since programs often contain bugs which can cause them to exceed their allocated memory. • If a program fails it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs, or viruses may purposefully alter another program's memory or may affect the operation of the operating system itself. With cooperative memory management it takes only one misbehaved program to crash the system.
  • 28.
    Page 28 VIRTUAL MEMORY •The use of virtual memory addressing (such as paging or segmentation) means that the kernel can choose what memory each program may use at any given time, allowing the operating system to use the same memory locations for multiple tasks.
  • 29.
    Page 29 DEVICE DRIVER •A device driver is a specific type of computer software developed to allow interaction with hardware devices. • Typically this constitutes an interface for communicating with the device, through the specific computer bus or communications subsystem that the hardware is connected to, providing commands to and/or receiving data from the device, and on the other end, the requisite interfaces to the operating system and software applications.
  • 30.
    Page 30 NETWORKING • Currentlymost operating systems support a variety of networking protocols, hardware, and applications for using them. • This means that computers running dissimilar operating systems can participate in a common network for sharing resources such as computing, files, printers, and scanners using either wired or wireless connections. Networks can essentially allow a computer's operating system to access the resources of a remote computer to support the same functions as it could if those resources were connected directly to the local computer.
  • 31.
    Page 31 SECURITY • Acomputer being secure depends on a number of technologies working properly. A modern operating system provides access to a number of resources, which are available to software running on the system, and to external devices like networks via the kernel. • External security involves a request from outside the computer, such as a login at a connected console or some kind of network connection. External requests are often passed through device drivers to the operating system's kernel, where they can be passed onto applications, or carried out directly.