Basics of Operating Systems Definition – Generations of Operating systems – Types of Operating Systems, OS Service, System Calls, OS structure: Layered, Monolithic, Microkernel Operating Systems – Concept of Virtual Machine
System is a collection of programs which control the overall functions of which control the overall functions of computer.
An operating system is a program that acts as an interface between the user of a computer and the computer hardware. The purpose of operating system is to provide an environment in which a user can execute programs in a efficient manner. Operating system also acts as a platform on which various application programs such as word processor and excel are executed.
This presentation gives a brief introduction on the following topics:
Definition
Objectives of Operating System
Structure of Operating System
Need for Operating Systems
OS Components and Functions
OS Services
Types of Operating Systems
Examples of Operating Systems
The components of an operating system all exist in order to make the different parts of a computer work together. All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet component.
System is a collection of programs which control the overall functions of which control the overall functions of computer.
An operating system is a program that acts as an interface between the user of a computer and the computer hardware. The purpose of operating system is to provide an environment in which a user can execute programs in a efficient manner. Operating system also acts as a platform on which various application programs such as word processor and excel are executed.
This presentation gives a brief introduction on the following topics:
Definition
Objectives of Operating System
Structure of Operating System
Need for Operating Systems
OS Components and Functions
OS Services
Types of Operating Systems
Examples of Operating Systems
The components of an operating system all exist in order to make the different parts of a computer work together. All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet component.
INTRODUCTION TO OPERATING SYSTEM
Operating System
Operating System Objectives
Layers of Computer Systems
Services Provided by the Operating System
Functions of Operating Systems
Types of Operating Systems
Enhancing an OS
Operating System Objectives
Layers of Computer System
Services Provided by the Operating System
Services Provided by the Operating System
Functions of Operating Systems
Providing a User Interface
Managing Hardware
Organizing Files and Folders
Types of Operating Systems
Operating System - Types Of Operating System Unit-1abhinav baba
In This Slide There is Operating System And it's types ( Types of operating system)
Batch Operating System
Network Operating System
Time Sharing Operating System
Real Time Operating System
Distributed Operating System
Introduction to OS, Operating system functions, evaluation of O.S., Different types of O.S.,
Batch multi programmed, Time-sharing, Real-time, Distributed, Parallel.
This silde is all about how to install or how to work operating systems on computers ..
all slides is about operating systems. .
how much types of OS is available on the computers ..
totally develop or invent by Mayank Thanki ( www.gujrattinfo.com )
Introduction, Virtual and Datagram networks, study of router, IP protocol and addressing in the Internet, Routing algorithms, Broadcast and Multicast routing
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
3. SYLLABUS
1 Introduction:- Basics of Operating Systems Definition – Generations of
Operating systems – Types of Operating Systems, OS Service, System Calls,
OS structure: Layered, Monolithic, Microkernel Operating Systems – Concept of
Virtual Machine
2 Process Management :- Processes: Definition , Process Relationship ,
Process states , Process State transitions , Process Control Block ,Context
switching – Threads – Concept of multithreads , Benefits of threads – Types of
threads
• Process Scheduling: Definition , Scheduling objectives ,Types of
Schedulers ,Scheduling criteria : CPU utilization, Throughput, Turnaround Time,
Waiting Time, Response Time (Definition only) , Scheduling algorithms : Pre
emptive and Non , pre emptive , FCFS – SJF – RR , Multiprocessor scheduling :
Types , Performance evaluation of the scheduling.
3 Interprocess Communication :- Race Conditions, Critical Section, Mutual
Exclusion, Hardware Solution, Strict Alternation , Peterson’s Solution, The
Producer Consumer Problem, Semaphores, Event Counters, Monitors,
Message Passing, Classical IPC Problems: Reader’s & Writer Problem, Dinning
Philosopher Problem etc., Scheduling , Scheduling Algorithms.
4. 4 Deadlocks:- Definition,Deadlock characteristics , Deadlock Prevention ,
Deadlock Avoidance :banker’s algorithm, Deadlock detection and Recovery.
5 Memory Management :- Basic Memory Management: Definition ,Logical
and Physical address map , Memory allocation : Contiguous Memory allocation
– Fixed and variable partition – Internal and External fragmentation and
Compaction , Paging : Principle of operation – Page allocation – Hardware
support for paging –,Protection and sharing – Disadvantages of paging.
• Virtual Memory: Basics of Virtual Memory – Hardware and control structures –
Locality of reference, Page fault , Working Set , Dirty page/Dirty bit – Demand
paging ( Concepts only) – Page Replacement policies : Optimal (OPT) , First in
First Out (FIFO), Second Chance (SC), Not recently used (NRU) and Least
Recently used (LRU)
6 I/O Management :- Principles of I/O Hardware: I/O devices, Device
controllers , Direct memory access Principles of I/O Software: Goals of Interrupt
handlers , Device drivers , Device independent I/O software , Secondary-
Storage Structure: Disk structure ,Disk scheduling algorithm
5. 7 File Management :- File concept, Aaccess methods, File types, File operation,
Directory structure, File System structure, Allocation methods
(contiguous,linked, indexed), Free-space management (bit vector, linked list,
grouping), directory implementation (linear list, hash table),efficiency &
performance.
8 Security & Protection :- Security Environment, Design Principles Of Security,
User Authentication, Protection Mechanism : Protection Domain, Access
Control List
9 Unix/Linux Operating System :- Development Of Unix/Linux, Role &
Function Of Kernel, System Calls, Elementary Linux command & Shell
Programming, Directory Structure, System Administration Case study: Linux,
Windows Operating System
6. BOOKS
• Reference Books:
1. Operating System Concepts (8th Edition) by Silberschatz, Peter B.
Galvin and Greg Gagne, Wiley-Indian Edition (2010).
2. Modern Operating Systems (Third Edition) by Andrew S Tanenbaum,
Prentice Hall India (2008).
3. Principles of Operating Systems by Naresh chauhan, Oxford Press
(2014).
4. Operating Systems by D.M. Dhamdhere, Tata McGraw Hill 2nd edition.
5. Operating Systems (5th Ed) – Internals and Design Principles by
William Stallings, Prentice Hall India, 2000
6. UNIX Concepts and Applications(4th Edition)– by Sumitabha Das, Tata
McGraw Hill.
7. Unix Shell Programming – by Yashwant Kanetkar, BPB publications.
9. CONTINUE…
• An Operating System (OS) is system software that manages
computer hardware and software resources and provides
common services for computer programs.
• The operating system is the most important program that runs
on a computer.
• Every general-purpose computer must have an operating
system to run other programs and applications.
• Operating systems perform basic tasks, such as
recognizing input from the keyboard, sending output to
the display screen, keeping track of files and directories on
the disk, and controlling peripheral devices such as disk
drives and printers.
10. CONTINUE…
• Definition:
An operating system is a program that acts as an
interface between the user and the computer hardware
and controls the execution of all kinds of programs.
11. • Following are some of important
functions of an operating System.
– Memory Management
– Processor Management
– Device Management
– File Management
– Security
– Control over system performance
– Job accounting
– Error detecting aids
– Coordination between other software and
users
12. • Memory Management:
– Memory management refers to management of Primary Memory or
Main Memory. Main memory is a large array of words or bytes
where each word or byte has its own address.
• Processor Management:
– In multiprogramming environment, OS decides which process gets
the processor when and how much time. This function is called
process scheduling. Operating System does the following activities
for processor management.
• Device Management:
– OS manages device communication via their respective drivers.
Operating System does the following activities for device
management.
• File Management:
– A file system is normally organized into directories for easy
navigation and usage. These directories may contain files and
other directions. Operating System does the following activities for
file management.
13. • Other Important Activities:
• Security -- By means of password and similar other
techniques, preventing unauthorized access to programs
and data.
• Control over system performance -- Recording delays
between request for a service and response from the
system.
• Job accounting -- Keeping track of time and resources
used by various jobs and users.
• Error detecting aids -- Production of dumps, traces, error
messages and other debugging and error detecting aids.
• Coordination between other softwares and users --
Coordination and assignment of compilers, interpreters,
assemblers and other software to the various users of the
computer systems.
14. Generations of Operating
System
• Early Evolution:
– 1945: ENIAC, Moore School of Engineering,
University of Pennsylvania.
– 1949: EDSAC and EDVAC
– 1949 BINAC – a successor to the ENIAC
– 1951: UNIVAC by Remington
– 1952: IBM 701
– 1956: The interrupt
– 1954–1957: FORTRAN was developed
15. • Operating Systems by the late 1950s
• By the late 1950s Operating systems were well
improved and started supporting following
usages:
– It was able to Single stream batch processing
– It could use Common, standardized, input/output
routines for device access
– Program transition capabilities to reduce the overhead
of starting a new job was added
– Error recovery to clean up after a job terminated
abnormally was added.
– Job control languages that allowed users to specify the
job definition and resource requirements were made
possible.
16. • Operating Systems In 1960s:
– 1961: The dawn of minicomputers
– 1962 Compatible Time-Sharing System (CTSS) from
MIT
– 1963 Burroughs Master Control Program (MCP) for the
B5000 system
– 1964: IBM System/360
– 1960s: Disks become mainstream
– 1966: Minicomputers get cheaper, more powerful, and
really useful
– 1967–1968: The mouse
– 1964 and onward: Multics
– 1969: The UNIX Time-Sharing System from Bell
Telephone Laboratories
17. • Supported OS Features by 1970s:
• Multi User and Multi tasking was
introduced.
• Dynamic address translation hardware and
Virtual machines came into picture.
• Modular architectures came into existence.
• Personal, interactive systems came into
existence.
18. • Accomplishments after 1970:
– 1971: Intel announces the microprocessor
– 1972: IBM comes out with VM: the Virtual Machine Operating
System
– 1973: UNIX 4th Edition is published
– 1973: Ethernet
– 1974 The Personal Computer Age begins
– 1974: Gates and Allen wrote BASIC for the Altair
– 1976: Apple II
– August 12, 1981: IBM introduces the IBM PC
– 1983 Microsoft begins work on MS-Windows
– 1984 Apple Macintosh comes out
– 1990 Microsoft Windows 3.0 comes out
– 1991 GNU/Linux
– 1992 The first Windows virus comes out
– 1993 Windows NT
– 2007: iOS
– 2008: Android OS
19. Types of Operating System
• Following are some of the most widely
used types of Operating system.
–Simple Batch System
–Multiprogramming Batch System
–Multiprocessor System
–Distributed Operating System
–Real-time Operating System
20. SIMPLE BATCH SYSTEMS
• In this type of system, there is no direct interaction between
user and the computer.
• The user has to submit a job (written on cards or tape) to a
computer operator.
• Then computer operator places a batch of several jobs on
an input device.
• Jobs are batched together by type of languages and
requirement.
• Then a special program, the monitor, manages the
execution of each program in the batch.
• The monitor is always in the main memory and available for
execution.
• Following are some disadvantages of this type of system :
– Zero interaction between user and computer.
– No mechanism to prioritize processes.
21. MULTIPROGRAMMING BATCH
SYSTEMS
• In this the operating system, picks and begins to execute one job from
memory.
• Once this job needs an I/O operation operating system switches to
another job (CPU and OS always busy).
• Jobs in the memory are always less than the number of jobs on
disk(Job Pool).
• If several jobs are ready to run at the same time, then system chooses
which one to run (CPU Scheduling).
• In Non-multiprogrammed system, there are moments when CPU sits
idle and does not do any work.
• In Multiprogramming system, CPU will never be idle and keeps on
processing.
• Time-Sharing Systems are very similar to Multiprogramming batch
systems. In fact time sharing systems are an extension of
multiprogramming systems.
• In time sharing systems the prime focus is on minimizing the response
time, while in multiprogramming the prime focus is to maximize the CPU
usage.
22. MULTIPROCESSOR SYSTEMS
• A multiprocessor system consists of several processors
that share a common physical memory. Multiprocessor
system provides higher computing power and speed. In
multiprocessor system all processors operate under single
operating system. Multiplicity of the processors and how
they do act together are transparent to the others.
• Following are some advantages of this type of system.
– Enhanced performance
– Execution of several tasks by different processors
concurrently, increases the system's throughput without
speeding up the execution of a single task.
– If possible, system divides task into many subtasks and
then these subtasks can be executed in parallel in
different processors. Thereby speeding up the execution
of single tasks.
23. DISTRIBUTED OPERATING SYSTEMS
• The motivation behind developing distributed
operating systems is the availability of powerful
and inexpensive microprocessors and advances
in communication technology.
• These advancements in technology have made it
possible to design and develop distributed
systems comprising of many computers that are
inter connected by communication networks. The
main benefit of distributed systems is its low
price/performance ratio.
24. REAL-TIME OPERATING
SYSTEM
• Real time system is defines as a data processing system
in which the time interval required to process and respond
to inputs is so small that it controls the environment.
• Hard real-time systems guarantee that critical tasks
complete on time. In hard real-time systems secondary
storage is limited or missing with data stored in ROM.
• Soft real time systems are less restrictive. Critical real-time
task gets priority over other tasks and retains the priority
until it completes.
• For example, Multimedia, virtual reality, Advanced
Scientific Projects like undersea exploration and planetary
rovers etc.
25. OS Services
• An Operating System provides services to
both the users and to the programs.
–It provides programs, an environment to
execute.
–It provides users, services to execute the
programs in a convenient manner.
26. • Following are few common services provided by
operating systems.
– Program execution
– I/O operations
– File System manipulation
– Communication
– Error Detection
– Resource Allocation
– Protection
27. Program execution:
• Operating system handles many kinds of activities from
user programs to system programs like printer spooler,
name servers, file server etc. Each of these activities is
encapsulated as a process.
• A process includes the complete execution context (code to
execute, data to manipulate, registers, OS resources in
use).
• Following are the major activities of an operating system
with respect to program management.
– Loads a program into memory.
– Executes the program.
– Handles program's execution.
– Provides a mechanism for process synchronization.
– Provides a mechanism for process communication.
– Provides a mechanism for deadlock handling.
28. I/O Operation:
• I/O subsystem comprised of I/O devices and their
corresponding driver software.
• Drivers hides the peculiarities of specific hardware devices
from the user as the device driver knows the peculiarities
of the specific device.
• Operating System manages the communication between
user and device drivers.
• Following are the major activities of an operating system
with respect to I/O Operation.
– I/O operation means read or write operation with any
file or any specific I/O device.
– Program may require any I/O device while running.
– Operating system provides the access to the required
I/O device when required.
29. File system manipulation:
• A file represents a collection of related information. Computer can store
files on the disk (secondary storage), for long term storage purpose.
Few examples of storage media are magnetic tape, magnetic disk and
optical disk drives like CD, DVD. Each of these media has its own
properties like speed, capacity, data transfer rate and data access
methods.
• A file system is normally organized into directories for easy navigation
and usage. These directories may contain files and other directions.
Following are the major activities of an operating system with respect to
file management.
• Program needs to read a file or write a file.
• The operating system gives the permission to the program for
operation on file.
• Permission varies from read-only, read-write, denied and so on.
• Operating System provides an interface to the user to create/delete
files.
• Operating System provides an interface to the user to create/delete
directories.
• Operating System provides an interface to create the backup of file
30. Communication:
• In case of distributed systems which are a collection of
processors that do not share memory, peripheral devices,
or a clock, operating system manages communications
between processes. Multiple processes with one another
through communication lines in the network.
• OS handles routing and connection strategies, and the
problems of contention and security.
• Following are the major activities of an operating system
with respect to communication.
– Two processes often require data to be transferred
between them.
– The both processes can be on the one computer or on
different computer but are connected through computer
network.
– Communication may be implemented by two methods
either by Shared Memory or by Message Passing.
31. Error handling:
• Error can occur anytime and anywhere. Error may
occur in CPU, in I/O devices or in the memory
hardware.
• Following are the major activities of an operating
system with respect to error handling.
– OS constantly remains aware of possible errors.
– OS takes the appropriate action to ensure
correct and consistent computing.
32. Resource Management:
• In case of multi-user or multi-tasking environment,
resources such as main memory, CPU cycles and
files storage are to be allocated to each user or
job.
• Following are the major activities of an operating
system with respect to resource management.
– OS manages all kind of resources using
schedulers.
– CPU scheduling algorithms are used for better
utilization of CPU.
33. Protection:
• Considering a computer systems having multiple users the
concurrent execution of multiple processes, then the various
processes must be protected from each another's activities.
• Protection refers to mechanism or a way to control the
access of programs, processes, or users to the resources
defined by a computer systems.
• Following are the major activities of an operating system
with respect to protection.
– OS ensures that all access to system resources is
controlled.
– OS ensures that external I/O devices are protected from
invalid access attempts.
– OS provides authentication feature for each user by
means of a password.
34. • System Call:
• A system call is how a program requests a
service from an operating system's kernel.
• These calls are generally available as routines
written in C and C++.
• Interface between a process and the operating
system kernel.
35.
36. • System calls are expensive.
• The system needs to perform many things
before executing a system call.
– The computer (hardware) saves its state
– The OS code takes control of the CPU,
privileges are updated.
– The OS examines the call parameters
– The OS performs the requested function
– The OS saves its state (and call results)
– The OS returns control of the CPU to the caller
37. • Steps for Making a System Call
(Example: read call):
38.
39. • Example:
• getuid() //get the user ID
• fork() //create a child process
• exec() //executing a program
40. Types of System Calls
• There are 5 different categories of system
calls:
• process control, file manipulation, device
manipulation, information maintenance
and communication.
41. • Process Control:
– A running program needs to be able to stop execution either
normally or abnormally. When execution is stopped abnormally,
often a dump of memory is taken and can be examined with a
debugger.
• File Management:
– Some common system calls
are create, delete, read, write, reposition, or close. Also, there is a
need to determine the file attributes – get and set file attribute.
Many times the OS provides an API to make these system calls.
• Device Management:
– Process usually require several resources to execute, if these
resources are available, they will be granted and control returned to
the user process. These resources are also thought of as devices.
Some are physical, such as a video card, and others are abstract,
such as a file.
– User programs request the device, and when finished
they release the device. Similar to files, we can read, write,
and reposition the device.
42. • Information Management:
– Some system calls exist purely for transferring information
between the user program and the operating system. An example
of this is time, or date.
– The OS also keeps information about all its processes and
provides system calls to report this information.
• Communication:
– There are two models of interprocess communication, the
message-passing model and the shared memory model.
– Message-passing uses a common mailbox to pass messages
between processes.
– Shared memory use certain system calls to create and gain
access to regions of memory owned by other processes. The two
processes exchange information by reading and writing in the
shared data.
43.
44.
45.
46. Layered Operating System
The operating system is
divided into a number of
layers (levels), each built
on top of lower layers. The
bottom layer (layer 0), is
the hardware; the highest
(layer N) is the user
interface.
With modularity, layers
are selected such that
each uses functions
(operations) and services
of only lower-level layers
47. Layered Structure
Hardware
Level 1
Level 2
Level N
...
• Hiding information at each
layer
• Develop a layer at a time
• The Nth
layer can access
services provided by the
(N-1)th
layer and provide
services to the (N+1)th
layer.
• Examples
– THE (6 layers)
– MS-DOS (4 layers)
48. Continue…
• One advantage of a layered operating system
structure is that each layer of code is given access
to only the lower level interfaces(and data
structures).
• This structure also allow the OS to be debugged
starting at the lowest level, adding one layer at a
time until the whole system works correctly.
• Layering also makes it easier to enhance the OS.
• One entire layer can be replaced without affecting
other parts of the system.
• Layered OS delivers low application performance
in comparison to monolithic OS.
53. Monolithic System Structure
• Traditional UNIX OS uses
monolithic kernel
architecture.
• The entire OS runs as a
single program in kernel
mode.
• All kernel routines are
together.
• A system call interface
• Examples:
– Linux
– Most Unix OS
– NT
Kernel
many many things
entry
User
program
User
program
call
return
54.
55. It is the oldest architecture used for developing operating system.
Operating system resides on kernel for anyone to execute.
System call is involved i.e. Switching from user mode to kernel mode
and transfer control to operating system shown as event 1.
Many CPU has two modes, kernel mode, for the operating system in
which all instruction are allowed and user mode for user program in which
I/O devices and certain other instruction are not allowed.
Two operating system then examines the parameter of the call to
determine which system call is to be carried out shown in event 2.
Next, the operating system index’s into a table that contains procedure
that carries out system call.
This operation is shown in events. Finally, it is called when the work has
been completed and the system call is finished, control is given back to the
user mode as shown in event 4.
56.
57. Comparison
Sr.
No.
Monolithic Kernel Microkernel
1. Kernel size is large. Kernel size is small.
2. OS is complex to design. OS is easy to design, implement and
install.
3. Request may be services faster. Request may be serviced slower than
monolithic kernel.
4. All the OS services are included in
the kernel.
Kernel provides only IPC and low level
device management services.
5. No message passing and non context
switching are required while the
kernel is performing the job.
Microkernel requires message passing
and context switches.
58. Virtual Machines
• Virtual machine is an illusion of a real machine.
• It is created by a real machine operating system, which
make a single real machine appears to be several real
machine.
• The architecture of virtual machine is shown above.
• The best example of virtual machine architecture is IBM
370 computer.
• In this system each user can choose a different operating
system.
59. • Actually, virtual machine can run several operating systems at
once, each of them on its virtual machine.
• Its multiprogramming shares the resource of a single machine in
different manner.
The concepts of virtual machine are:-
a. Control program (cp):- cp creates the environment in which
virtual machine can execute. It gives to each user facilities of real
machine such as processor, storage I/0 devices.
b. conversation monitor system (cons):- cons is a system application
having features of developing program. It contains editor,
language translator, and various application packages.
c. Remote spooling communication system (RSCS):- provide virtual
machine with the ability to transmit and receive file in distributed
system.
d. IPCS (interactive problem control system):- it is used to fix the
virtual machine software problems.