SlideShare a Scribd company logo
NACHOS 2 Theoretical Presentation  Carlos Eduardo Triana Sarmiento Jonathan Alvarado Mata Obed David Guevara Ibarra
[object Object],[object Object],[object Object],[object Object],[object Object]
Sumarizing, Kernel is what runs in supervisor mode, and all other is user programs Compilers, window managers, and utility programs packaged with a typical operating system are actually user programs though they are part of system software Now we can say that all the Linux distributions are basically same. If we don’t alter the kernel code, they differ only in provided utility programs.
After the system boots up, kernel does some management tasks, creates and initializes the data structures necessary. Unix based operating systems then create Process 0 which runs in kernel mode. Process 0 forks and creates User mode Process called init(). Every other user programs are created by calling fork() copying parent’s address space. Record of parent child relationships are kept inside several kernel data structures. When user process is let to run, the system is in user mode and kernel mode (or supervisor mode) is achieved only via traps or system calls.
When you invoke nachos with the "-x" flag, the MIPS simulator begins executing the user program specified, instruction by instruction (the MIPS simulator is an interpreter that reads in binary instructions and simulates their effect). Whenever an event occurs that the OS needs to know about, the simulator makes a procedure call into the Nachos kernel.
The basic idea of virtual memory its: main memory used as a cache for backing store Virtual memory   is a memory management technique developed for multitasking kernels Virtual memory makes it possible for computers to more easily handle larger and more complex applications All implementations of virtual memory divide a virtual address space into pages, blocks of contiguous virtual memory addresses. Pages are usually at least 4 kilobytes in size. Virtual Memory
Page tables are used to translate the virtual addresses seen by the application into physical addresses by the hardware to process instructions Each entry in the page table holds a flag indicating whether the corresponding page is in real memory or not. If it is in real memory, the page table entry will contain the real memory address at which the page is stored. If the page table entry for the page indicates that it is not currently in real memory, the hardware raises a page fault exception, invoking the paging supervisor component of the operating system.
For example, if you load the operating system, an e-mail, a web browser and word processor into RAM simultaneously, is not enough space to hold it all. If there were no Virtual Memory, then once you filled up the available RAM your computer would have to say: "Sorry, you can not load any more applications, please close another application to load a new one". With virtual memory, what the computer can do is look at RAM areas that have not been used recently and copy them onto the hard disk. This frees up space in RAM to load the new application.
Pseudo-code VM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
File   Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],File system
File system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object]
Control block of a file
Directories in UNIX systems are organized keeping certain hierarchy
 
Pseudo-code
Bibliography ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Operating system Memory management
Operating system Memory management Operating system Memory management
Operating system Memory management
Shashank Asthana
 
Linux Memory Management
Linux Memory ManagementLinux Memory Management
Linux Memory Management
Suvendu Kumar Dash
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
vampugani
 
Memory management ppt
Memory management pptMemory management ppt
Memory management ppt
ManishaJha43
 
Overview of Distributed Systems
Overview of Distributed SystemsOverview of Distributed Systems
Overview of Distributed Systems
vampugani
 
Memory management OS
Memory management OSMemory management OS
Memory management OS
UmeshchandraYadav5
 
Storage management
Storage managementStorage management
Storage management
Atul Sharma
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
Johan Granados Montero
 
Memory management
Memory managementMemory management
Memory management
Memory managementMemory management
Memory management
Muhammad Fayyaz
 
Operating Systems Part III-Memory Management
Operating Systems Part III-Memory ManagementOperating Systems Part III-Memory Management
Operating Systems Part III-Memory Management
Ajit Nayak
 
Vmreport
VmreportVmreport
Vmreportmeru2ks
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
Kumar Pritam
 
Memory management
Memory managementMemory management
Memory management
cpjcollege
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - IntroductionWayne Jones Jnr
 
Purdue CS354 Operating Systems 2008
Purdue CS354 Operating Systems 2008Purdue CS354 Operating Systems 2008
Purdue CS354 Operating Systems 2008
guestd9065
 
System components of windows xp
System components of windows xpSystem components of windows xp
System components of windows xpMohd Tousif
 
Operating Systems - Virtual Memory
Operating Systems - Virtual MemoryOperating Systems - Virtual Memory
Operating Systems - Virtual Memory
Damian T. Gordon
 

What's hot (20)

Operating system Memory management
Operating system Memory management Operating system Memory management
Operating system Memory management
 
Linux Memory Management
Linux Memory ManagementLinux Memory Management
Linux Memory Management
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
 
Memory management ppt
Memory management pptMemory management ppt
Memory management ppt
 
Overview of Distributed Systems
Overview of Distributed SystemsOverview of Distributed Systems
Overview of Distributed Systems
 
Memory management OS
Memory management OSMemory management OS
Memory management OS
 
Storage management
Storage managementStorage management
Storage management
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
 
Memory management
Memory managementMemory management
Memory management
 
Memory management
Memory managementMemory management
Memory management
 
Operating Systems Part III-Memory Management
Operating Systems Part III-Memory ManagementOperating Systems Part III-Memory Management
Operating Systems Part III-Memory Management
 
Memory
MemoryMemory
Memory
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Vmreport
VmreportVmreport
Vmreport
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Memory management
Memory managementMemory management
Memory management
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
 
Purdue CS354 Operating Systems 2008
Purdue CS354 Operating Systems 2008Purdue CS354 Operating Systems 2008
Purdue CS354 Operating Systems 2008
 
System components of windows xp
System components of windows xpSystem components of windows xp
System components of windows xp
 
Operating Systems - Virtual Memory
Operating Systems - Virtual MemoryOperating Systems - Virtual Memory
Operating Systems - Virtual Memory
 

Viewers also liked

Firma Digital
Firma DigitalFirma Digital
Firma Digital
anarkia99bmx
 
Firma Digital
Firma DigitalFirma Digital
Firma Digital
mizar1
 
Firma digital
Firma digitalFirma digital
Firma digital
joselox5
 
Guadalinfo de Campillo de Arenas - Firma Digital
Guadalinfo de Campillo de Arenas - Firma DigitalGuadalinfo de Campillo de Arenas - Firma Digital
Guadalinfo de Campillo de Arenas - Firma Digital
Guadalinfo Campillo de Arenas
 
Firma Digital
Firma DigitalFirma Digital
Firma Digital
alexanderbetancur19
 
4199437 diagrama-de-flujo-de-ventas
4199437 diagrama-de-flujo-de-ventas4199437 diagrama-de-flujo-de-ventas
4199437 diagrama-de-flujo-de-ventas
raulraul1
 

Viewers also liked (7)

Firma digital
Firma digitalFirma digital
Firma digital
 
Firma Digital
Firma DigitalFirma Digital
Firma Digital
 
Firma Digital
Firma DigitalFirma Digital
Firma Digital
 
Firma digital
Firma digitalFirma digital
Firma digital
 
Guadalinfo de Campillo de Arenas - Firma Digital
Guadalinfo de Campillo de Arenas - Firma DigitalGuadalinfo de Campillo de Arenas - Firma Digital
Guadalinfo de Campillo de Arenas - Firma Digital
 
Firma Digital
Firma DigitalFirma Digital
Firma Digital
 
4199437 diagrama-de-flujo-de-ventas
4199437 diagrama-de-flujo-de-ventas4199437 diagrama-de-flujo-de-ventas
4199437 diagrama-de-flujo-de-ventas
 

Similar to Nachos 2

virtual memory
virtual memoryvirtual memory
virtual memory
Abeer Naskar
 
Io sy.stemppt
Io sy.stempptIo sy.stemppt
Io sy.stemppt
muthumani mahesh
 
ppt
pptppt
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1rohassanie
 
Solid-State diskA solid-state drive also known as a solid-state di.pdf
Solid-State diskA solid-state drive also known as a solid-state di.pdfSolid-State diskA solid-state drive also known as a solid-state di.pdf
Solid-State diskA solid-state drive also known as a solid-state di.pdf
saahinmanpam
 
Bt0070 operating systems 2
Bt0070 operating systems  2Bt0070 operating systems  2
Bt0070 operating systems 2
Techglyphs
 
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryAshik Iqbal
 
How many total bits are required for a direct-mapped cache with 2048 .pdf
How many total bits are required for a direct-mapped cache with 2048 .pdfHow many total bits are required for a direct-mapped cache with 2048 .pdf
How many total bits are required for a direct-mapped cache with 2048 .pdf
Eye2eyeopticians10
 
Operating system
Operating systemOperating system
Operating system
Hussain Ahmady
 
virtual memory - Computer operating system
virtual memory - Computer operating systemvirtual memory - Computer operating system
virtual memory - Computer operating system
Electronics - Embedded System
 
Kernel
KernelKernel
Kernel
Abu Azzam
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementPaging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory management
kazim Hussain
 
Chapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.pptChapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.ppt
MonirJihad1
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)Sohaib Danish
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
AshokRachapalli1
 
Android Memory Management
Android Memory ManagementAndroid Memory Management
Android Memory Management
Sadmankabirsoumik
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
Abhaycavirtual memory and the pagehit.pptx
Abhaycavirtual memory and the pagehit.pptxAbhaycavirtual memory and the pagehit.pptx
Abhaycavirtual memory and the pagehit.pptx
wemoji5816
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
PratikBose10
 
virtual memory.ppt
virtual memory.pptvirtual memory.ppt
virtual memory.ppt
suryansh85
 

Similar to Nachos 2 (20)

virtual memory
virtual memoryvirtual memory
virtual memory
 
Io sy.stemppt
Io sy.stempptIo sy.stemppt
Io sy.stemppt
 
ppt
pptppt
ppt
 
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1
 
Solid-State diskA solid-state drive also known as a solid-state di.pdf
Solid-State diskA solid-state drive also known as a solid-state di.pdfSolid-State diskA solid-state drive also known as a solid-state di.pdf
Solid-State diskA solid-state drive also known as a solid-state di.pdf
 
Bt0070 operating systems 2
Bt0070 operating systems  2Bt0070 operating systems  2
Bt0070 operating systems 2
 
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache Memory
 
How many total bits are required for a direct-mapped cache with 2048 .pdf
How many total bits are required for a direct-mapped cache with 2048 .pdfHow many total bits are required for a direct-mapped cache with 2048 .pdf
How many total bits are required for a direct-mapped cache with 2048 .pdf
 
Operating system
Operating systemOperating system
Operating system
 
virtual memory - Computer operating system
virtual memory - Computer operating systemvirtual memory - Computer operating system
virtual memory - Computer operating system
 
Kernel
KernelKernel
Kernel
 
Paging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory managementPaging +Algorithem+Segmentation+memory management
Paging +Algorithem+Segmentation+memory management
 
Chapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.pptChapter 09 - Virtual Memory.ppt
Chapter 09 - Virtual Memory.ppt
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
 
Android Memory Management
Android Memory ManagementAndroid Memory Management
Android Memory Management
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado
 
Abhaycavirtual memory and the pagehit.pptx
Abhaycavirtual memory and the pagehit.pptxAbhaycavirtual memory and the pagehit.pptx
Abhaycavirtual memory and the pagehit.pptx
 
NOV11 virtual memory.ppt
NOV11 virtual memory.pptNOV11 virtual memory.ppt
NOV11 virtual memory.ppt
 
virtual memory.ppt
virtual memory.pptvirtual memory.ppt
virtual memory.ppt
 

More from Eduardo Triana

NachOS 3 - Practical presentation
NachOS 3 - Practical presentationNachOS 3 - Practical presentation
NachOS 3 - Practical presentationEduardo Triana
 
Nachos3 - Theoretical Part
Nachos3 - Theoretical PartNachos3 - Theoretical Part
Nachos3 - Theoretical PartEduardo Triana
 
Nachos 2 Practical Part
Nachos 2 Practical PartNachos 2 Practical Part
Nachos 2 Practical PartEduardo Triana
 
Nachos 2 Practical Part
Nachos 2 Practical PartNachos 2 Practical Part
Nachos 2 Practical PartEduardo Triana
 
Nachos 2 Practical Part
Nachos 2 Practical PartNachos 2 Practical Part
Nachos 2 Practical PartEduardo Triana
 
Operating systems
Operating systemsOperating systems
Operating systems
Eduardo Triana
 

More from Eduardo Triana (12)

1 internetworking
1 internetworking1 internetworking
1 internetworking
 
1 internetworking
1 internetworking1 internetworking
1 internetworking
 
Redes final
Redes finalRedes final
Redes final
 
Redes proyecto
Redes proyectoRedes proyecto
Redes proyecto
 
PicSumador
PicSumadorPicSumador
PicSumador
 
NachOS 3 - Practical presentation
NachOS 3 - Practical presentationNachOS 3 - Practical presentation
NachOS 3 - Practical presentation
 
Nachos3 - Theoretical Part
Nachos3 - Theoretical PartNachos3 - Theoretical Part
Nachos3 - Theoretical Part
 
Nachos 2 Practical Part
Nachos 2 Practical PartNachos 2 Practical Part
Nachos 2 Practical Part
 
Nachos 2 Practical Part
Nachos 2 Practical PartNachos 2 Practical Part
Nachos 2 Practical Part
 
Nachos 2 Practical Part
Nachos 2 Practical PartNachos 2 Practical Part
Nachos 2 Practical Part
 
Nachos Extra Points
Nachos Extra PointsNachos Extra Points
Nachos Extra Points
 
Operating systems
Operating systemsOperating systems
Operating systems
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Nachos 2

  • 1. NACHOS 2 Theoretical Presentation Carlos Eduardo Triana Sarmiento Jonathan Alvarado Mata Obed David Guevara Ibarra
  • 2.
  • 3. Sumarizing, Kernel is what runs in supervisor mode, and all other is user programs Compilers, window managers, and utility programs packaged with a typical operating system are actually user programs though they are part of system software Now we can say that all the Linux distributions are basically same. If we don’t alter the kernel code, they differ only in provided utility programs.
  • 4. After the system boots up, kernel does some management tasks, creates and initializes the data structures necessary. Unix based operating systems then create Process 0 which runs in kernel mode. Process 0 forks and creates User mode Process called init(). Every other user programs are created by calling fork() copying parent’s address space. Record of parent child relationships are kept inside several kernel data structures. When user process is let to run, the system is in user mode and kernel mode (or supervisor mode) is achieved only via traps or system calls.
  • 5. When you invoke nachos with the "-x" flag, the MIPS simulator begins executing the user program specified, instruction by instruction (the MIPS simulator is an interpreter that reads in binary instructions and simulates their effect). Whenever an event occurs that the OS needs to know about, the simulator makes a procedure call into the Nachos kernel.
  • 6. The basic idea of virtual memory its: main memory used as a cache for backing store Virtual memory   is a memory management technique developed for multitasking kernels Virtual memory makes it possible for computers to more easily handle larger and more complex applications All implementations of virtual memory divide a virtual address space into pages, blocks of contiguous virtual memory addresses. Pages are usually at least 4 kilobytes in size. Virtual Memory
  • 7. Page tables are used to translate the virtual addresses seen by the application into physical addresses by the hardware to process instructions Each entry in the page table holds a flag indicating whether the corresponding page is in real memory or not. If it is in real memory, the page table entry will contain the real memory address at which the page is stored. If the page table entry for the page indicates that it is not currently in real memory, the hardware raises a page fault exception, invoking the paging supervisor component of the operating system.
  • 8. For example, if you load the operating system, an e-mail, a web browser and word processor into RAM simultaneously, is not enough space to hold it all. If there were no Virtual Memory, then once you filled up the available RAM your computer would have to say: "Sorry, you can not load any more applications, please close another application to load a new one". With virtual memory, what the computer can do is look at RAM areas that have not been used recently and copy them onto the hard disk. This frees up space in RAM to load the new application.
  • 9.
  • 10.  
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 18. Directories in UNIX systems are organized keeping certain hierarchy
  • 19.  
  • 21.

Editor's Notes

  1. le hace falta un chat a esto
  2. supongo no vamos a dar todo lo que pongamos aqui vdd? porque la dra puso que daria mas puntos si ponemos inf extra en las presentaciones del blog
  3. supongo no vamos a dar todo lo que pongamos aqui vdd? porque la dra puso que daria mas puntos si ponemos inf extra en las presentaciones del blog
  4. eee obed no entiendo donde te puse los ??? Las cargas de trabajo  principales del sistema  de archivos relevantes parecen ser esque no eran con punto jajaja aaaa con razon  perdon we soy humano   jaja perdonado xD
  5. we si me pueden ayudar a quitar lo blanco que tienen unas lineas :(
  6. jajaja ponlo en otra diapositiva terquedad! quieres ponerlo todo en una sola jajaja triana????????