SlideShare a Scribd company logo
1 of 10
Operating System 08
Multi-processing Time sharing and
Multitasking OS
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Multiprogramming Operating
System
• The objective of a multiprogramming operating system is to increase
the system utilization efficiency.
• The batch processing system tries to reduce the CPU idle time
through operator interaction. However, it cannot reduce the idle time
due to IO operations.
• So, when some IO is being performed by the currently executing job
of a batch, the CPU sits idle without any work to do.
• Thus, the multiprogramming operating system tries to eliminate such
idle times by providing multiple computational tasks for the CPU to
perform.
• This is achieved by keeping multiple jobs in the main store.
• So, when the job that is being currently executed on the CPU needs
some IO, the CPU passes its requirement over to the IO processor.
• Till the time the IO operation is being carried out, the CPU is free
to carry out some other job.
Time Sharing or Multitasking
System
• Time sharing, or multitasking, is a logical extension
of multiprogramming.
• Multiple jobs are executed by the CPU switching
between them, but the switches occur so frequently
that the users may interact with each program
while it is running.
• An interactive, or hands-on, computer system
provides on-line communication between the user
and the system.
• The user gives instructions to the operating system
or to a program directly, and receives an
immediate response.
Time Sharing or Multitasking
System : File Management
• If users are to be able to access both data and code
conveniently, an on-line file system must be available. A
file is a collection of related information defined by its
creator.
• Commonly, files represent programs (both source and
object forms) and data.
• The operating system implements the abstract concept
of a file by managing mass-storage devices, such disks.
• Files are normally organized into logical clusters, or
directories, which make them easier to locate and
access.
• Since multiple users have access to files, it is desirable
to control by whom and in what ways files may be
accessed.
Time Sharing or Multitasking
System : Interactive jobs
• Batch systems are appropriate for executing large jobs that
need little interaction.
• The user can submit jobs and return later for the results; it is
not necessary for the user to wait while the job is processed.
• Interactive jobs tend to be composed of many short actions,
where the results of the next command may be unpredictable.
• The user submits the command and then waits for the
results. Accordingly, the response time should be short—on
the order of seconds at most.
• An interactive system is used when a short response time is
required.
• Time-sharing systems were developed to provide interactive
use of a computer system at a reasonable cost.
• A time-shared operating system uses CPU scheduling and
multiprogramming to provide each user with a small portion of
a time-shared computer.
Time Sharing or Multitasking
System : Process Management
• Each user has at least one separate program in
memory.
• A program that is loaded into memory and is executing
is commonly referred to as a process.
• When a process executes, it typically executes for only
a short time before it either finishes or needs to
perform I/O.
• I/O may be interactive; that is, output is to a display for
the user and input is from a user keyboard.
• A time-shared operating system allows the many users
to share the computer simultaneously.
• Since each action or command in a time-shared system
tends to be short, only a little CPU time is needed for
each user.
Time Sharing or Multitasking
System : Memory Management
• Time-sharing operating systems are even more complex
than are multi-programmed operating systems.
• As in multiprogramming, several jobs must be kept
simultaneously in memory, which requires some form of
memory management and protection.
• So that a reasonable response time can be obtained,
jobs may have to be swapped in and out of main
memory.
• As the system switches rapidly from one user to the
next, each user is given the impression that she has
her own computer, whereas actually one computer is
being shared among many users.
Multi- Processing or Parallel
Systems
• Most systems to date are single-processor systems; that
is, they have only one main CPU. However, there is a
trend toward multiprocessor systems.
• Such systems have more than one processor in close
communication, sharing the computer bus, the clock,
and sometimes memory and peripheral devices.
• These systems are referred to as tightly coupled
systems.
• There are several reasons for building such systems
such as increased throughput, lower cost, increased
reliability, fault tolerance.
• The Tandem system uses both hardware and software
duplication to ensure continued operation despite faults
Multiprogramming Vs
Multiprocessing Vs Multitasking
• The words multiprogramming, multiprocessing and multitasking are often
confused. There are, of course, some distinctions between these similar, but
distinct terms.
The term multiprogramming refers to the situation in which a single CPU divides
its time between more than one job. Time sharing is a special case of
multiprogramming, where a single CPU serves a number of users at interactive
terminals.
In multiprocessing, multiple CPUs perform more than one job at one time.
Multiprogramming and multiprocessing are not mutually exclusive. Some
mainframes and supermini computers have multiple CPUs each of which can
juggle several jobs.
The term multitasking is described any system that runs or appears to run more
than one application program one time. An effective multitasking environment
must provide many services both to the user and to the application program it
runs. The most important of these are resource management which divides the
computers time, memory and peripheral devices among competing tasks and
interprocess communication, which lets tasking coordinate their activities by
exchanging information
Assignment
• Explain Time sharing Operating Systems
• Briefly describe multi programming and multi-
processing OS

More Related Content

What's hot

6 multiprogramming & time sharing
6 multiprogramming & time sharing6 multiprogramming & time sharing
6 multiprogramming & time sharingmyrajendra
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Mukesh Chinta
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process ConceptsMukesh Chinta
 
Operating Systems
Operating SystemsOperating Systems
Operating Systemsvampugani
 
Multi Processors And Multi Computers
 Multi Processors And Multi Computers Multi Processors And Multi Computers
Multi Processors And Multi ComputersNemwos
 
Os Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual MemoryOs Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual Memorysgpraju
 
Timing and control
Timing and controlTiming and control
Timing and controlchauhankapil
 
Process scheduling algorithms
Process scheduling algorithmsProcess scheduling algorithms
Process scheduling algorithmsShubham Sharma
 
Cpu scheduling in operating System.
Cpu scheduling in operating System.Cpu scheduling in operating System.
Cpu scheduling in operating System.Ravi Kumar Patel
 
The purpose of an operating system
The purpose of an operating systemThe purpose of an operating system
The purpose of an operating system11southongeorgeb
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating systemMohammad Alam
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basicsnishantsri
 
Multiprocessor Systems
Multiprocessor SystemsMultiprocessor Systems
Multiprocessor Systemsvampugani
 

What's hot (20)

Generation of os
Generation of osGeneration of os
Generation of os
 
OS Structure
OS StructureOS Structure
OS Structure
 
6 multiprogramming & time sharing
6 multiprogramming & time sharing6 multiprogramming & time sharing
6 multiprogramming & time sharing
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
 
System calls
System callsSystem calls
System calls
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Multi Processors And Multi Computers
 Multi Processors And Multi Computers Multi Processors And Multi Computers
Multi Processors And Multi Computers
 
Os Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual MemoryOs Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual Memory
 
Timing and control
Timing and controlTiming and control
Timing and control
 
Process scheduling algorithms
Process scheduling algorithmsProcess scheduling algorithms
Process scheduling algorithms
 
Process of operating system
Process of operating systemProcess of operating system
Process of operating system
 
File system structure
File system structureFile system structure
File system structure
 
Cpu scheduling in operating System.
Cpu scheduling in operating System.Cpu scheduling in operating System.
Cpu scheduling in operating System.
 
The purpose of an operating system
The purpose of an operating systemThe purpose of an operating system
The purpose of an operating system
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
Interrupts and types of interrupts
Interrupts and types of interruptsInterrupts and types of interrupts
Interrupts and types of interrupts
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
 
CPU Scheduling Algorithms
CPU Scheduling AlgorithmsCPU Scheduling Algorithms
CPU Scheduling Algorithms
 
Multiprocessor Systems
Multiprocessor SystemsMultiprocessor Systems
Multiprocessor Systems
 

Similar to OS 08: Time Sharing, Multiprogramming & Multiprocessing- Time sharing OS allow multiple users to access a computer simultaneously through rapid switching between user programs. This provides an interactive experience where users receive quick responses. - Multiprogramming OS improve CPU utilization by executing multiple jobs concurrently, switching between them when one is waiting for I/O. This reduces idle time compared to batch systems.- Multiprocessing systems have multiple CPUs that can each multitask, further improving throughput over single-CPU systems. They provide increased performance, reliability and fault tolerance.- In summary, time sharing enables interactive use

Operating system concepts
Operating system conceptsOperating system concepts
Operating system conceptsArnav Chowdhury
 
Types of operating system.................
Types of operating system.................Types of operating system.................
Types of operating system.................harendersin82880
 
OperatingSystemFeature.pptx
OperatingSystemFeature.pptxOperatingSystemFeature.pptx
OperatingSystemFeature.pptxCharuJain396881
 
os unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systemsos unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systemsssuser6aef00
 
Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Ismail Mukiibi
 
Unit 4 Real Time Operating System
Unit 4 Real Time Operating SystemUnit 4 Real Time Operating System
Unit 4 Real Time Operating SystemDr. Pankaj Zope
 
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptxUNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptxLeahRachael
 
4-Process control block.pptx
4-Process control block.pptx4-Process control block.pptx
4-Process control block.pptxsania458451
 
4-Process control block.pptx
4-Process control block.pptx4-Process control block.pptx
4-Process control block.pptxsania458451
 
Evolution, Strutcture and Operations.pptx
Evolution, Strutcture and Operations.pptxEvolution, Strutcture and Operations.pptx
Evolution, Strutcture and Operations.pptxssuser000e54
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating SystemTHEFPS
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
Operating System Components.pptx
Operating System Components.pptxOperating System Components.pptx
Operating System Components.pptxpkavithascs
 

Similar to OS 08: Time Sharing, Multiprogramming & Multiprocessing- Time sharing OS allow multiple users to access a computer simultaneously through rapid switching between user programs. This provides an interactive experience where users receive quick responses. - Multiprogramming OS improve CPU utilization by executing multiple jobs concurrently, switching between them when one is waiting for I/O. This reduces idle time compared to batch systems.- Multiprocessing systems have multiple CPUs that can each multitask, further improving throughput over single-CPU systems. They provide increased performance, reliability and fault tolerance.- In summary, time sharing enables interactive use (20)

Mainframe systems
Mainframe systemsMainframe systems
Mainframe systems
 
Operating system concepts
Operating system conceptsOperating system concepts
Operating system concepts
 
Types of operating system.................
Types of operating system.................Types of operating system.................
Types of operating system.................
 
OperatingSystemFeature.pptx
OperatingSystemFeature.pptxOperatingSystemFeature.pptx
OperatingSystemFeature.pptx
 
Os notes 1_5
Os notes 1_5Os notes 1_5
Os notes 1_5
 
os unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systemsos unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systems
 
Operating System-adi.pdf
Operating System-adi.pdfOperating System-adi.pdf
Operating System-adi.pdf
 
Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2
 
Operating System
Operating SystemOperating System
Operating System
 
1. Introduction to OS.ppt
1. Introduction to OS.ppt1. Introduction to OS.ppt
1. Introduction to OS.ppt
 
Unit 4 Real Time Operating System
Unit 4 Real Time Operating SystemUnit 4 Real Time Operating System
Unit 4 Real Time Operating System
 
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptxUNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
 
4-Process control block.pptx
4-Process control block.pptx4-Process control block.pptx
4-Process control block.pptx
 
4-Process control block.pptx
4-Process control block.pptx4-Process control block.pptx
4-Process control block.pptx
 
Unit I OS.pdf
Unit I OS.pdfUnit I OS.pdf
Unit I OS.pdf
 
Evolution, Strutcture and Operations.pptx
Evolution, Strutcture and Operations.pptxEvolution, Strutcture and Operations.pptx
Evolution, Strutcture and Operations.pptx
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Introduction to operating systems
 Introduction to operating systems Introduction to operating systems
Introduction to operating systems
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
 
Operating System Components.pptx
Operating System Components.pptxOperating System Components.pptx
Operating System Components.pptx
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

OS 08: Time Sharing, Multiprogramming & Multiprocessing- Time sharing OS allow multiple users to access a computer simultaneously through rapid switching between user programs. This provides an interactive experience where users receive quick responses. - Multiprogramming OS improve CPU utilization by executing multiple jobs concurrently, switching between them when one is waiting for I/O. This reduces idle time compared to batch systems.- Multiprocessing systems have multiple CPUs that can each multitask, further improving throughput over single-CPU systems. They provide increased performance, reliability and fault tolerance.- In summary, time sharing enables interactive use

  • 1. Operating System 08 Multi-processing Time sharing and Multitasking OS Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Multiprogramming Operating System • The objective of a multiprogramming operating system is to increase the system utilization efficiency. • The batch processing system tries to reduce the CPU idle time through operator interaction. However, it cannot reduce the idle time due to IO operations. • So, when some IO is being performed by the currently executing job of a batch, the CPU sits idle without any work to do. • Thus, the multiprogramming operating system tries to eliminate such idle times by providing multiple computational tasks for the CPU to perform. • This is achieved by keeping multiple jobs in the main store. • So, when the job that is being currently executed on the CPU needs some IO, the CPU passes its requirement over to the IO processor. • Till the time the IO operation is being carried out, the CPU is free to carry out some other job.
  • 3. Time Sharing or Multitasking System • Time sharing, or multitasking, is a logical extension of multiprogramming. • Multiple jobs are executed by the CPU switching between them, but the switches occur so frequently that the users may interact with each program while it is running. • An interactive, or hands-on, computer system provides on-line communication between the user and the system. • The user gives instructions to the operating system or to a program directly, and receives an immediate response.
  • 4. Time Sharing or Multitasking System : File Management • If users are to be able to access both data and code conveniently, an on-line file system must be available. A file is a collection of related information defined by its creator. • Commonly, files represent programs (both source and object forms) and data. • The operating system implements the abstract concept of a file by managing mass-storage devices, such disks. • Files are normally organized into logical clusters, or directories, which make them easier to locate and access. • Since multiple users have access to files, it is desirable to control by whom and in what ways files may be accessed.
  • 5. Time Sharing or Multitasking System : Interactive jobs • Batch systems are appropriate for executing large jobs that need little interaction. • The user can submit jobs and return later for the results; it is not necessary for the user to wait while the job is processed. • Interactive jobs tend to be composed of many short actions, where the results of the next command may be unpredictable. • The user submits the command and then waits for the results. Accordingly, the response time should be short—on the order of seconds at most. • An interactive system is used when a short response time is required. • Time-sharing systems were developed to provide interactive use of a computer system at a reasonable cost. • A time-shared operating system uses CPU scheduling and multiprogramming to provide each user with a small portion of a time-shared computer.
  • 6. Time Sharing or Multitasking System : Process Management • Each user has at least one separate program in memory. • A program that is loaded into memory and is executing is commonly referred to as a process. • When a process executes, it typically executes for only a short time before it either finishes or needs to perform I/O. • I/O may be interactive; that is, output is to a display for the user and input is from a user keyboard. • A time-shared operating system allows the many users to share the computer simultaneously. • Since each action or command in a time-shared system tends to be short, only a little CPU time is needed for each user.
  • 7. Time Sharing or Multitasking System : Memory Management • Time-sharing operating systems are even more complex than are multi-programmed operating systems. • As in multiprogramming, several jobs must be kept simultaneously in memory, which requires some form of memory management and protection. • So that a reasonable response time can be obtained, jobs may have to be swapped in and out of main memory. • As the system switches rapidly from one user to the next, each user is given the impression that she has her own computer, whereas actually one computer is being shared among many users.
  • 8. Multi- Processing or Parallel Systems • Most systems to date are single-processor systems; that is, they have only one main CPU. However, there is a trend toward multiprocessor systems. • Such systems have more than one processor in close communication, sharing the computer bus, the clock, and sometimes memory and peripheral devices. • These systems are referred to as tightly coupled systems. • There are several reasons for building such systems such as increased throughput, lower cost, increased reliability, fault tolerance. • The Tandem system uses both hardware and software duplication to ensure continued operation despite faults
  • 9. Multiprogramming Vs Multiprocessing Vs Multitasking • The words multiprogramming, multiprocessing and multitasking are often confused. There are, of course, some distinctions between these similar, but distinct terms. The term multiprogramming refers to the situation in which a single CPU divides its time between more than one job. Time sharing is a special case of multiprogramming, where a single CPU serves a number of users at interactive terminals. In multiprocessing, multiple CPUs perform more than one job at one time. Multiprogramming and multiprocessing are not mutually exclusive. Some mainframes and supermini computers have multiple CPUs each of which can juggle several jobs. The term multitasking is described any system that runs or appears to run more than one application program one time. An effective multitasking environment must provide many services both to the user and to the application program it runs. The most important of these are resource management which divides the computers time, memory and peripheral devices among competing tasks and interprocess communication, which lets tasking coordinate their activities by exchanging information
  • 10. Assignment • Explain Time sharing Operating Systems • Briefly describe multi programming and multi- processing OS