SlideShare a Scribd company logo
K.KAVIYA(14BIT008)
SUBMITTED TO:
Ms.R.MADHUBALA, MCA.,
This file system can be viewed logically
consist of following parts:
 Disk structure
 Disk scheduling
 Disk Management
 Swap-space Management
 Disk provide the bulk of secondary storage
 Magnetic tape was used an early secondary storage
medium
 Modern disk drives are addressed as large one-
dimensional arrays of logical blocks
 The logical blocks is the smallest unit of tranfer.
 The one-dimensional array of logical blocks is
mapped onto the sectors of the disk sequentially.
 It is difficult to perform two reasons
 Most disks have some defective sectors.
 The number of sectors per track is not a
constant on some drives.
 The disk drives has fast access time and disk bandwidth
 The access time has two major components.
 Seek time
 Rotational latency
 The disk bandwidth is the total number of byes
transferred, divided by the total time between the
first request for service and the completion of the last
transfer.
 The request specifies several pieces of information
I. Whether this operation is input or output
II. What the disk address for the transfer is
III. What the memory address for the transfer is
IV. What the number of bytes to the transferred is
The simplest form of disk scheduling is the first
come, first-served(FCFS) algorithm.
The algorithm does not provide the fastest
services.
SSTF Scheduling
 It seems reasonable to service all the requests
close to the current head position, before
moving the head far away to service.
 The assumption is the basis for the shortest-
seek-time-first algorithm
 The SSTF algorithm selects the request with
the minimum seek time from the current head
position
 In the scan algorithm the disk arm starts at one
end of the disk, and moves toward the other end.
 The direction of head movement is reversed, and
servicing continues.
 The scan algorithm is sometimes called the
elevator algorithm
C- SCAN scheduling
 Circular scan scheduling is a variant of SCAN designed
to provide a more wait time
 The C-SCAN scheduling algorithm treats the cylinders
as a circular list that wraps around from the final cylinder
to the first one.
• The scheduling algorithms described the seek
distances for modern disks, the rotational latency
Can be nearly as large as the average seek time.
• But it is difficult for the operating system to
scheduled for improved rotational latency because
modern disks do not disclose the physical location of
logical blocks.
Disk Formatting
• A new magnetic disk is a blank slate.
• It must be divided into sectors that the disk controller
can read and write. This process is called Low level
formatting
• A sector number and an error-correcting code.
• The operating system still needs to record its own data
structures.
• In two steps
• The first step is two partition the disk into one or more
groups of cylinders
• The second step is logical formatting.
• In this step the operating system stores the initial file
system data structures into the disk
 The bootstrap is stored in read only memory
 The full bootstrap program is stored in a partition
called the boot blocks, at a fixed location on the
disk.
 A disk that has a boot partition is called a boot
disk or system disk.
Bad blocks
 Most frequently, one or more sectors become defective.
 Most disks even come form the factory with bad blocks
 This scheme is known as sector sparing or forwarding
Swap-space management is another low-level task of the
operating system
The main goal for the design and implementation of swap
space is to provide the best throughput for the
Virtual memory system
Swap-space use
Swap space is used in various ways by different operating systems,
depending on the implemented memory-management
Algorithms.
Swap-space Location
 A swap space can reside in two places.
 Swap space can be carved out of the normal file system or it can be
in a seperated disk partition.
 Windows 2000 Operating system is a 32-bit
preemptive multitasking operating system for Intel
pentium and later microprocessor.
 In 1980 Microsoft and IBM cooperated to develop
the OS/2 operating system in single processor Intel
80286
 Microsoft developed a portable operating system
that supported both the application system.
 There are four versions of windows 2000
 The professional version intended for desktop use.
 The other three are server version datacenter
version.
 The design goals that Micros0ft has stated for
windows 2000 include Extensibility, portability,
compatibility, performance.
 Extensibility refers to the capacity of the operating
system to keep up advances in computing technology
 Windows 2000 uses a client-server model.
 Mach operating system and supports multiple
processing by remoter procedure call(RPC).
 An operating system is portable and it can be
moved from one hardware architecture to another.
 The architecture of windows 2000 is a layered
system of modules.
 The user-mode subsystems are in two categories
environment subsystems emulate different operating
systems;the subsystems provide security functions.
 One of the chief advantages of the architecture is
the intreactions between modules can be kept simple
remainder of this section describes these layers and
subsytems.
 HAL is the layer of software that hides hardware
differences from the operating system,virtual-machine
interface that is used by the kernel,the exculive and
device drivers.
 One advantage of this approach is that only a single
of each device driver is needed-it can run on all
hardware flatform will porting the driver code.
 The kernal of windows 2000 provides the fundation
for the executive and subsystems.
 kernal uses to sets of objects. The first set
comparises the dispatcher.
 Dispatcher objects control dispatching and
synchoronous the event object is used to record an
event occurances.
 Synchronize the later with some action A semaphore
objects acts as a counter or gate to control the number
that access some resource.
 The thread object is the entity that is run kernal and
is associated with a process object.
 Timer objects are used to keep track of the time
and
and to signal time outs when operations and need to
be interrupted
 The second set of kernal objects comparises the
control objects.
 The power states object to check whether the
power
a process object represents the virtual address
space and control.
 The system uses the profile object to measure the
amount of time used by a amount of code
 Windows 2000 uses the process and threads for
executable code .
 Each process has one or more threads. Each thread
has its own state.
 It includes a priority, processor, affinity, and
accounting information.
 The six possible thread states or ready, stand by ,
running, waiting, and terminated.
 Ready means waiting to run.
 The highest priority thread is moved to the standby
state.
 A thread is running when it is executing on a
processor
 A thread is in the waiting state when it is waiting for
a signal
 A new thread is in the transition state while it is
waiting resourcs necessary for execlution
 A thread enters the terminated state finishes
execution
 Kernal also provides trap handling for exceptions
and interrupts that are used by hardware or software
 windows 2000 defines several architecture
exceptions including memory-access violation integer
overflow or underflow, integer divide by zero, floating-
point by zero , illegal instruction , data misalignment,
privileged instruction, read error , guard-page,
violation, paging files, quote exceeded, debugger, point
and debugger, single step.
 The exeption dispatcher creates and exception that
contains the reason for the exception and finds an
exception handler deal with it.
 The kernal uses an interrupted dispatch table to
bind each interrupt that a service routine
 Windows 2000 takes advantage of this property to
software interrupts to perform system functions
 kernal uses the dispatch interrupt to control thread
context switching to the kernal is running.
 It queues a deferred procedure call(DPC) that
contains the address of the function to be executed
and generates interrupt.
 They cannot modify its memory: create, acquire, or
wait on objects, call system services or page faults.
 Third reponsibility of the kernal is to provide low-
level processor synchronization.
 The APC mechanism is similar to the DPC algorithm
but was most use.
 The APC mechanism enables threads to set up a
procedure call that happen out of the blue at some
future time.
 windows 2000 can run on symmetric multiprocessor
machines, so the kernal must prevent two of its
threads from modifying a shared data structure in
same time.
 The fourth and final responsibility of the kernal is
to provide recovery after a failure
 A power fail interrupt which has the second-highest
priority notifies the operating system whenever a
power loss is detected.
 The power notify object provides a way for a device
driver to register a routine that is call on power
restoration and ensures that devices get set to the
proper and recovery
 Object manager
 Virtual- Memory Manager
 process manager
 Local-procedure-call facility
 I/O manager
 Security reference monitor
 Plug-and-play manager
MS-DOS subsystem
16-bit Windows Environment
 Win32 Environment
 POSIX subsystem
 OS/2 subsystem
 Logon and security subsystem
• Internal layout
• Recovery
• Security
• Volume Management andFault Tolerance
• Compression
• Reparse Points
 Windows 2000 supports both peer-to-peer and
client server networking.
The networking components provide data transport,
interprocess communication file sharing across a network,
and the ability to send print jobs to remote printers.
 Protocols
 Distributed processing Mechanisms

More Related Content

What's hot

Io sy.stemppt
Io sy.stempptIo sy.stemppt
Io sy.stemppt
muthumani mahesh
 
Device Driver in WinCE 6.0 R2
Device Driver in WinCE 6.0 R2Device Driver in WinCE 6.0 R2
Device Driver in WinCE 6.0 R2
rahul_p_shukla
 
Cs8493 unit 2
Cs8493 unit 2Cs8493 unit 2
Cs8493 unit 2
Kathirvel Ayyaswamy
 
Ch2
Ch2Ch2
Cs8493 unit 3
Cs8493 unit 3Cs8493 unit 3
Cs8493 unit 3
Kathirvel Ayyaswamy
 
Process management
Process managementProcess management
Process managementMohd Arif
 
Chapter 9 OS
Chapter 9 OSChapter 9 OS
Chapter 9 OSC.U
 
Understanding Modern Device Drivers
Understanding Modern Device DriversUnderstanding Modern Device Drivers
Understanding Modern Device Drivers
asimkadav
 
Driver development – memory management
Driver development – memory managementDriver development – memory management
Driver development – memory management
Vandana Salve
 
Kernel
KernelKernel
Kernel
Abu Azzam
 
Kernel (OS)
Kernel (OS)Kernel (OS)
LINUX Device Drivers
LINUX Device DriversLINUX Device Drivers
LINUX Device Drivers
Partha Bhattacharya
 
UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
Dr.YNM
 
Cs8493 unit 1
Cs8493 unit 1Cs8493 unit 1
Cs8493 unit 1
Kathirvel Ayyaswamy
 
My ppt @ bec doms on process management
My ppt @ bec doms on process managementMy ppt @ bec doms on process management
My ppt @ bec doms on process management
Babasab Patil
 
System components of windows xp
System components of windows xpSystem components of windows xp
System components of windows xpMohd Tousif
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
Stacksol
 

What's hot (18)

Io sy.stemppt
Io sy.stempptIo sy.stemppt
Io sy.stemppt
 
Device Driver in WinCE 6.0 R2
Device Driver in WinCE 6.0 R2Device Driver in WinCE 6.0 R2
Device Driver in WinCE 6.0 R2
 
Cs8493 unit 2
Cs8493 unit 2Cs8493 unit 2
Cs8493 unit 2
 
Ch2
Ch2Ch2
Ch2
 
Cs8493 unit 3
Cs8493 unit 3Cs8493 unit 3
Cs8493 unit 3
 
Process management
Process managementProcess management
Process management
 
Chapter 9 OS
Chapter 9 OSChapter 9 OS
Chapter 9 OS
 
Understanding Modern Device Drivers
Understanding Modern Device DriversUnderstanding Modern Device Drivers
Understanding Modern Device Drivers
 
Driver development – memory management
Driver development – memory managementDriver development – memory management
Driver development – memory management
 
Kernel
KernelKernel
Kernel
 
Kernel (OS)
Kernel (OS)Kernel (OS)
Kernel (OS)
 
LINUX Device Drivers
LINUX Device DriversLINUX Device Drivers
LINUX Device Drivers
 
UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
 
Cs8493 unit 1
Cs8493 unit 1Cs8493 unit 1
Cs8493 unit 1
 
OSCh21
OSCh21OSCh21
OSCh21
 
My ppt @ bec doms on process management
My ppt @ bec doms on process managementMy ppt @ bec doms on process management
My ppt @ bec doms on process management
 
System components of windows xp
System components of windows xpSystem components of windows xp
System components of windows xp
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 

Viewers also liked

Modern device for the modern workplace
Modern device for the modern workplaceModern device for the modern workplace
Modern device for the modern workplace
Microsoft India
 
Microsoft Campaign - #Tags4Trees
Microsoft Campaign - #Tags4TreesMicrosoft Campaign - #Tags4Trees
Microsoft Campaign - #Tags4Trees
Microsoft India
 
Planning your Digital Workplace: A Systems-Based Planning Approach
Planning your Digital Workplace: A Systems-Based Planning ApproachPlanning your Digital Workplace: A Systems-Based Planning Approach
Planning your Digital Workplace: A Systems-Based Planning Approach
Christian Buckley
 
Future Trends in the Digital Workplace
Future Trends in the Digital WorkplaceFuture Trends in the Digital Workplace
Future Trends in the Digital Workplace
Martin Risgaard Rasmussen
 
Mission: Launch a Digital Workplace
Mission: Launch a Digital Workplace Mission: Launch a Digital Workplace
Mission: Launch a Digital Workplace
BMC Software
 
Harnessing Revolution: Creating The Future Workforce
Harnessing Revolution: Creating The Future WorkforceHarnessing Revolution: Creating The Future Workforce
Harnessing Revolution: Creating The Future Workforce
accenture
 

Viewers also liked (6)

Modern device for the modern workplace
Modern device for the modern workplaceModern device for the modern workplace
Modern device for the modern workplace
 
Microsoft Campaign - #Tags4Trees
Microsoft Campaign - #Tags4TreesMicrosoft Campaign - #Tags4Trees
Microsoft Campaign - #Tags4Trees
 
Planning your Digital Workplace: A Systems-Based Planning Approach
Planning your Digital Workplace: A Systems-Based Planning ApproachPlanning your Digital Workplace: A Systems-Based Planning Approach
Planning your Digital Workplace: A Systems-Based Planning Approach
 
Future Trends in the Digital Workplace
Future Trends in the Digital WorkplaceFuture Trends in the Digital Workplace
Future Trends in the Digital Workplace
 
Mission: Launch a Digital Workplace
Mission: Launch a Digital Workplace Mission: Launch a Digital Workplace
Mission: Launch a Digital Workplace
 
Harnessing Revolution: Creating The Future Workforce
Harnessing Revolution: Creating The Future WorkforceHarnessing Revolution: Creating The Future Workforce
Harnessing Revolution: Creating The Future Workforce
 

Similar to Operating system ppt

Operation System
Operation SystemOperation System
Operation System
ROHINIPRIYA1997
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
Lavanya G
 
Operation System
Operation SystemOperation System
Operation System
ANANTHI1997
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
malarselvi mms
 
Os
OsOs
os
osos
I/O System and Case Study
I/O System and Case StudyI/O System and Case Study
I/O System and Case Study
GRamya Bharathi
 
UNIT II.pptx
UNIT II.pptxUNIT II.pptx
UNIT II.pptx
YogapriyaJ1
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]
Akhil Nadh PC
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
pramila kanagaraj
 
I/O structure slide by Rajalakshmi SKC
I/O structure slide by Rajalakshmi SKCI/O structure slide by Rajalakshmi SKC
I/O structure slide by Rajalakshmi SKC
RAJALAKSHMI RADHAKRISHNAN
 
CS403: Operating System : Unit I _merged.pdf
CS403: Operating System :  Unit I _merged.pdfCS403: Operating System :  Unit I _merged.pdf
CS403: Operating System : Unit I _merged.pdf
Asst.prof M.Gokilavani
 
lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categories
WajeehaBaig
 
Linux architecture
Linux architectureLinux architecture
Linux architecturemcganesh
 
Unit vos - File systems
Unit vos - File systemsUnit vos - File systems
Unit vos - File systems
donny101
 
Os
OsOs

Similar to Operating system ppt (20)

Operation System
Operation SystemOperation System
Operation System
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
Operation System
Operation SystemOperation System
Operation System
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
Os
OsOs
Os
 
os
osos
os
 
I/O System and Case Study
I/O System and Case StudyI/O System and Case Study
I/O System and Case Study
 
UNIT II.pptx
UNIT II.pptxUNIT II.pptx
UNIT II.pptx
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]
 
Walking around linux kernel
Walking around linux kernelWalking around linux kernel
Walking around linux kernel
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
I/O structure slide by Rajalakshmi SKC
I/O structure slide by Rajalakshmi SKCI/O structure slide by Rajalakshmi SKC
I/O structure slide by Rajalakshmi SKC
 
CS403: Operating System : Unit I _merged.pdf
CS403: Operating System :  Unit I _merged.pdfCS403: Operating System :  Unit I _merged.pdf
CS403: Operating System : Unit I _merged.pdf
 
lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categories
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
2337610
23376102337610
2337610
 
Unit vos - File systems
Unit vos - File systemsUnit vos - File systems
Unit vos - File systems
 
Operating system
Operating systemOperating system
Operating system
 
Os
OsOs
Os
 
Os
OsOs
Os
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Operating system ppt

  • 2. This file system can be viewed logically consist of following parts:  Disk structure  Disk scheduling  Disk Management  Swap-space Management
  • 3.  Disk provide the bulk of secondary storage  Magnetic tape was used an early secondary storage medium  Modern disk drives are addressed as large one- dimensional arrays of logical blocks  The logical blocks is the smallest unit of tranfer.  The one-dimensional array of logical blocks is mapped onto the sectors of the disk sequentially.  It is difficult to perform two reasons  Most disks have some defective sectors.  The number of sectors per track is not a constant on some drives.
  • 4.  The disk drives has fast access time and disk bandwidth  The access time has two major components.  Seek time  Rotational latency  The disk bandwidth is the total number of byes transferred, divided by the total time between the first request for service and the completion of the last transfer.  The request specifies several pieces of information I. Whether this operation is input or output II. What the disk address for the transfer is III. What the memory address for the transfer is IV. What the number of bytes to the transferred is
  • 5. The simplest form of disk scheduling is the first come, first-served(FCFS) algorithm. The algorithm does not provide the fastest services. SSTF Scheduling  It seems reasonable to service all the requests close to the current head position, before moving the head far away to service.  The assumption is the basis for the shortest- seek-time-first algorithm  The SSTF algorithm selects the request with the minimum seek time from the current head position
  • 6.  In the scan algorithm the disk arm starts at one end of the disk, and moves toward the other end.  The direction of head movement is reversed, and servicing continues.  The scan algorithm is sometimes called the elevator algorithm C- SCAN scheduling  Circular scan scheduling is a variant of SCAN designed to provide a more wait time  The C-SCAN scheduling algorithm treats the cylinders as a circular list that wraps around from the final cylinder to the first one.
  • 7. • The scheduling algorithms described the seek distances for modern disks, the rotational latency Can be nearly as large as the average seek time. • But it is difficult for the operating system to scheduled for improved rotational latency because modern disks do not disclose the physical location of logical blocks.
  • 8. Disk Formatting • A new magnetic disk is a blank slate. • It must be divided into sectors that the disk controller can read and write. This process is called Low level formatting • A sector number and an error-correcting code. • The operating system still needs to record its own data structures. • In two steps • The first step is two partition the disk into one or more groups of cylinders • The second step is logical formatting. • In this step the operating system stores the initial file system data structures into the disk
  • 9.  The bootstrap is stored in read only memory  The full bootstrap program is stored in a partition called the boot blocks, at a fixed location on the disk.  A disk that has a boot partition is called a boot disk or system disk. Bad blocks  Most frequently, one or more sectors become defective.  Most disks even come form the factory with bad blocks  This scheme is known as sector sparing or forwarding
  • 10. Swap-space management is another low-level task of the operating system The main goal for the design and implementation of swap space is to provide the best throughput for the Virtual memory system Swap-space use Swap space is used in various ways by different operating systems, depending on the implemented memory-management Algorithms. Swap-space Location  A swap space can reside in two places.  Swap space can be carved out of the normal file system or it can be in a seperated disk partition.
  • 11.
  • 12.  Windows 2000 Operating system is a 32-bit preemptive multitasking operating system for Intel pentium and later microprocessor.  In 1980 Microsoft and IBM cooperated to develop the OS/2 operating system in single processor Intel 80286  Microsoft developed a portable operating system that supported both the application system.  There are four versions of windows 2000  The professional version intended for desktop use.  The other three are server version datacenter version.
  • 13.  The design goals that Micros0ft has stated for windows 2000 include Extensibility, portability, compatibility, performance.  Extensibility refers to the capacity of the operating system to keep up advances in computing technology  Windows 2000 uses a client-server model.  Mach operating system and supports multiple processing by remoter procedure call(RPC).  An operating system is portable and it can be moved from one hardware architecture to another.
  • 14.  The architecture of windows 2000 is a layered system of modules.  The user-mode subsystems are in two categories environment subsystems emulate different operating systems;the subsystems provide security functions.  One of the chief advantages of the architecture is the intreactions between modules can be kept simple remainder of this section describes these layers and subsytems.
  • 15.  HAL is the layer of software that hides hardware differences from the operating system,virtual-machine interface that is used by the kernel,the exculive and device drivers.  One advantage of this approach is that only a single of each device driver is needed-it can run on all hardware flatform will porting the driver code.
  • 16.  The kernal of windows 2000 provides the fundation for the executive and subsystems.  kernal uses to sets of objects. The first set comparises the dispatcher.  Dispatcher objects control dispatching and synchoronous the event object is used to record an event occurances.  Synchronize the later with some action A semaphore objects acts as a counter or gate to control the number that access some resource.  The thread object is the entity that is run kernal and is associated with a process object.
  • 17.  Timer objects are used to keep track of the time and and to signal time outs when operations and need to be interrupted  The second set of kernal objects comparises the control objects.  The power states object to check whether the power a process object represents the virtual address space and control.  The system uses the profile object to measure the amount of time used by a amount of code
  • 18.  Windows 2000 uses the process and threads for executable code .  Each process has one or more threads. Each thread has its own state.  It includes a priority, processor, affinity, and accounting information.  The six possible thread states or ready, stand by , running, waiting, and terminated.
  • 19.  Ready means waiting to run.  The highest priority thread is moved to the standby state.  A thread is running when it is executing on a processor  A thread is in the waiting state when it is waiting for a signal  A new thread is in the transition state while it is waiting resourcs necessary for execlution  A thread enters the terminated state finishes execution
  • 20.  Kernal also provides trap handling for exceptions and interrupts that are used by hardware or software  windows 2000 defines several architecture exceptions including memory-access violation integer overflow or underflow, integer divide by zero, floating- point by zero , illegal instruction , data misalignment, privileged instruction, read error , guard-page, violation, paging files, quote exceeded, debugger, point and debugger, single step.  The exeption dispatcher creates and exception that contains the reason for the exception and finds an exception handler deal with it.
  • 21.  The kernal uses an interrupted dispatch table to bind each interrupt that a service routine  Windows 2000 takes advantage of this property to software interrupts to perform system functions  kernal uses the dispatch interrupt to control thread context switching to the kernal is running.  It queues a deferred procedure call(DPC) that contains the address of the function to be executed and generates interrupt.  They cannot modify its memory: create, acquire, or wait on objects, call system services or page faults.
  • 22.  Third reponsibility of the kernal is to provide low- level processor synchronization.  The APC mechanism is similar to the DPC algorithm but was most use.  The APC mechanism enables threads to set up a procedure call that happen out of the blue at some future time.  windows 2000 can run on symmetric multiprocessor machines, so the kernal must prevent two of its threads from modifying a shared data structure in same time.
  • 23.  The fourth and final responsibility of the kernal is to provide recovery after a failure  A power fail interrupt which has the second-highest priority notifies the operating system whenever a power loss is detected.  The power notify object provides a way for a device driver to register a routine that is call on power restoration and ensures that devices get set to the proper and recovery
  • 24.  Object manager  Virtual- Memory Manager  process manager  Local-procedure-call facility  I/O manager  Security reference monitor  Plug-and-play manager
  • 25. MS-DOS subsystem 16-bit Windows Environment  Win32 Environment  POSIX subsystem  OS/2 subsystem  Logon and security subsystem
  • 26. • Internal layout • Recovery • Security • Volume Management andFault Tolerance • Compression • Reparse Points
  • 27.  Windows 2000 supports both peer-to-peer and client server networking. The networking components provide data transport, interprocess communication file sharing across a network, and the ability to send print jobs to remote printers.  Protocols  Distributed processing Mechanisms