SlideShare a Scribd company logo
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56
OPERATING SYSTEM
Mr. Anand H. D.
1
Operating System: Introduction
Department of Electronics & Communication Engineering
Dr. Ambedkar Institute of Technology
Bengaluru-56
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 2
Operating System: Introduction
Goals of an Operating System : Efficient Use User Convenience Noninterference
Operation of an Operating System: Program management Resource management Security and protection
Topics to be covered:
Goals of an Operating System
Operation of an Operating System
https://youtu.be/pTdSs8kQqSA
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 3
Operating System: Introduction
Goals of an Operating System : User Convenience Noninterference
Operation of an Operating System: Program management Resource management Security and protection
Goals of Operating System:
Efficient Use
 The fundamental goals of an operating system are:
• Efficient use
• User convenience
• Noninterference
 The goals of efficient use and user convenience sometimes conflict.
For example, emphasis on quick service would lead to inefficient use of resources,
the designer has to make a trade-off to obtain the combination of efficient use and user
convenience that best suits the environment-effective utilization of the computer system.
Interference with a user’s activities:-
Operating Systems:
illegal use or modification of a user’s programs or data,
denial of resources and services to a user.
: Ensure efficient use of a computer’s resources.
: Provide convenient methods of using a computer system.
: Prevent interference in the activities of its users.
fast service required by command and control applications,
make efficient use of computer resources to provide low-cost
computing
provide different combinations of the two extremes
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 4
Operating System: Introduction
Goals of an Operating System : User Convenience Noninterference
Operation of an Operating System: Program management Resource management Security and protection
Goals of Operating System:
Efficient Use
An operating system must ensure efficient use of the fundamental computer system
resources of memory, CPU, and I/O devices such as disks and printers.
Poor efficiency can result if a program does not use a resource allocated to it, e.g., if
memory or I/O devices allocated to a program remain idle - leads to snowballing effect
In addition, the OS itself consumes some CPU and memory resources during its own
operation, and this consumption of resources constitutes an overhead that also reduces the
resources available to user programs.
Efficient use of resources can be obtained by monitoring use of resources and performing
corrective actions when necessary. However, monitoring use of resources increases the
overhead, which lowers efficiency of use.
In practice, operating systems that emphasize efficient use limit their overhead by either
restricting their focus to efficiency of a few important resources, like the CPU and the
memory, or by not monitoring the use of resources at all, and instead handling user
programs and resources in a manner that guarantees high efficiency
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 5
Operating System: Introduction
Goals of an Operating System : Noninterference
Operation of an Operating System: Program management Resource management Security and protection
Goals of Operating System:
Efficient Use User Convenience
User convenience has many facets, as shown in following Table:
Fulfillment of necessity
Good Service
User friendly interfaces
New programming model
Web-oriented features
Evolution
Ability to execute programs, use the file system
Speedy response to computational requests
Easy-to-use commands, graphical user interface (GUI)
Concurrent programming
Means to set up Web-enabled servers
Add new features, use new computer technologies
Facet Examples
Table: Facets of User Convenience
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 6
Operating System: Introduction
Goals of an Operating System : Noninterference
Operation of an Operating System: Program management Resource management Security and protection
Goals of Operating System:
Efficient Use User Convenience
In the early days of computing, user convenience was synonymous with bare necessity
Other facets of user convenience evolved with the use of computers in new fields. Early
operating systems had command-line interfaces, which required a user to type in a
command and specify values of its parameters- scientists or computer professionals
Simpler interfaces were needed to facilitate use of computers by new classes of users. Hence
graphical user interfaces (GUIs) were evolved. These interfaces used icons on
a screen to represent programs and files and interpreted mouse clicks on the icons and
associated menus as commands concerning them.
New models were proposed for developing cost-effective solutions to new classes of
problems. Some of these models could be supported by the compiler technology and required
little support from the OS; modular and object-oriented program design are two such models.
Other models like the concurrent programming model required specific support features in
the OS.
Advent of the Internet motivated setting up of Web-enabled servers, which required
networking support and an ability to scale up or scale down the performance of a server in
response to the amount of load directed at it.
Users and their organizations invest considerable time and effort in setting up their
applications through an operating system. This investment must be protected when new
application areas and new computer technologies develop,
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 7
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Program management Resource management Security and protection
Goals of Operating System:
Efficient Use User Convenience Noninterference
A computer user can face different kinds of interference in his computational activities.
Execution of his program can be disrupted by actions of other persons, or the OS services.
The OS prevents such interference by allocating resources for exclusive use of
programs and OS services, and preventing illegal accesses to resources.
Another form of interference is when a computer user may collaborate with some other users
in the development or use of a computer application, so he may wish to share some of his files
with them.
Attempts by any other person to access his files are illegal and constitute interference.
To prevent this form of interference, an OS has to know which files of a user can
be accessed by which persons. It is achieved through the act of authorization,
whereby a user specifies which collaborators can access what files. The OS uses this
information to prevent illegal accesses to files.
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 8
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Resource management Security and protection
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management
The primary concerns of an OS during its operation are execution of programs,
use of resources, and prevention of interference with programs and resources.
Accordingly, its three principal functions are:
• Program management: The OS initiates programs, arranges their execution on the CPU,
and terminates them when they complete their execution.
Since many programs exist in the system at any time, the OS performs a function called
scheduling to select a program for execution
• Resource management: The OS allocates resources like memory and I/O devices when a
program needs them.
When the program terminates, it de-allocates these resources and allocates them to other
programs that need them.
• Security and protection: The OS implements noninterference in users’ activities through
joint actions of the security and protection functions.
As an example, consider how the OS prevents illegal accesses to a file.
The security function prevents nonusers from utilizing the services and resources in the
computer system, hence none of them can access the file.
The protection function prevents users other than the file owner or users authorized by
him, from accessing the file.
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 9
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Resource management Security and protection
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management
Table describes the tasks commonly performed by an operating system.
Construct a list of resource
Maintain information for security
Verify identity of a user
Initiate execution of programs
Maintain authorization information
Perform resource allocation
During booting
While registering new users
At user commands
When a user specifies which collaborators can access what
programs or data
When requested by users or programs
Task When performed
Table: Common Tasks Performed by Operating Systems
At login time
Maintain current status of resources
Maintain current status of programs
and perform scheduling
During resource allocation/de-allocation
Continually during OS operation
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 10
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Resource management Security and protection
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management
When a computer system is switched on, it automatically loads a program stored on a
reserved part of an I/O device, typically a disk, and starts executing the program. This
program follows a software technique known as bootstrapping to load the software called
the boot procedure in memory
The boot procedure makes a list of all hardware resources in the system, and hands over
control of the computer system to the OS.
A system administrator specifies which persons are registered as users of the system. The
OS permits only these persons to log in to use its resources and services.
A user authorizes his collaborators to access some programs and data. The OS notes this
information and uses it to implement protection.
The OS also performs a set of functions to implement its notion of effective utilization.
These functions include scheduling of programs and keeping track of resource status
and resource usage information.
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 11
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Resource management Security and protection
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management
Modern CPUs have the capability to execute program instructions at a very high rate, so it is
possible for an OS to interleave execution of several programs on a CPU and yet provide good
user service.
The key function in achieving interleaved execution of programs is scheduling, which decides
which program should be given the CPU at any time.
Figure shows an abstract view of scheduling.
Figure: A schematic of scheduling.
Scheduler CPU
Completed
Program
New
Program
…..
Programs in ready Queue
waiting for CPU
Scheduled
Program
P1P2Pn
Preempted Program
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 12
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Resource management Security and protection
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management
The scheduler, which is an OS routine that performs scheduling, maintains a list of programs waiting
to execute on the CPU, and selects one program for execution.
In operating systems that provide fair service to all programs, the scheduler also specifies how long
the program can be allowed to use the CPU.
The OS takes away the CPU from a program after it has executed for the specified period of time, and
gives it to another program. This action is called preemption. A program that loses the CPU because of
preemption is put back into the list of programs waiting to execute on the CPU.
The scheduling policy employed by an OS can influence both efficient use of the CPU and user service.
If a program is preempted after it has executed for only a short period of time, the overhead of
scheduling actions would be high because of frequent preemption. However, each program would
suffer only a short delay before it gets an opportunity to use the CPU, which would result in good user
service.
If preemption is performed after a program has executed for a longer period of time, scheduling
overhead would be lesser but programs would suffer longer delays, so user service would be poorer
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 13
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Security and protection
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management Resource management
Resource allocations and de-allocations can be performed by using a resource table. Each entry in the table
contains the name and address of a resource unit and its present status, indicating whether it is free or allocated
to some program.
Table below is one such table for management of I/O devices. It is constructed by the boot procedure by sensing
the presence of I/O devices in the system, and updated by the operating system to reflect the allocations and
deallocations made by it.
printer1
printer2
printer3
disk1
disk2
cdw1
Resource
Name
AddressClass Allocation
status
Printer
Printer
Printer
Disk
Disk
CD writer
101
102
103
201
202
301
Allocated to P1
Free
Free
Allocated to P1
Allocated to P2
Free
Resource Table for I/O Devices
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 14
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Security and protection
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management Resource management
Two resource allocation strategies are popular.
In the resource partitioning approach, the OS decides a priori what resources should be allocated to
each user program,
for example, it may decide that a program should be allocated 1 MB of memory, 1000 disk
blocks, and a monitor. It divides the resources in the system into many resource partitions, or
simply partitions; each partition includes 1 MB of memory, 1000 disk blocks, and a monitor.
It allocates one resource partition to each user program when its execution is to be initiated. To
facilitate resource allocation, the resource table contains entries for resource partitions rather than
for individual resources as in Table shown.
Resource partitioning is simple to implement, hence it incurs less overhead; however, it lacks
flexibility. Resources are wasted if a resource partition contains more resources than what a
program needs.
Also, the OS cannot execute a program if its requirements exceed the resources available in a
resource partition. This is true even if free resources exist in another partition.
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 15
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Security and protection
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management Resource management
In the pool-based approach to resource management, the OS allocates resources from a common pool of
resources. It consults the resource table when a program makes a request for a resource, and allocates the
resource if it is free. It incurs the overhead of allocating and de-allocating resources when requested.
However, it avoids both problems faced by the resource partitioning approach— an allocated resource is not
wasted, and a resource requirement can be met if a free resource exists.
A virtual resource is a fictitious resource—it is an illusion supported by an OS through use of a real resource.
An OS may use the same real resource to support several virtual resources. This way, it can give the impression
of having a larger number of resources than it actually does.
Each use of a virtual resource results in the use of an appropriate real resource. In that sense, a virtual resource
is an abstract view of a resource taken by a program. Use of virtual resources started with the use of virtual
devices.
To prevent mutual interference between programs, it was a good idea to allocate a device exclusively for use
by one program. However, a computer system did not possess many real devices, so virtual devices were used.
An OS would create a virtual device when a user needed an I/O device;
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 16
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Security and protection
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management Resource management
 In Table it could be two virtual disks based on the real disk, which are allocated to programs P1
and P2, respectively.
Virtual devices are used in contemporary operating systems as well. A print server is a common
example of a virtual device.
When a program wishes to print a file, the print server simply copies the file into the print queue.
The program requesting the print goes on with its operation as if the printing had been performed.
The print server continuously examines the print queue and prints the files it finds in the queue.
Most operating systems provide a virtual resource called virtual memory, which is an illusion of a
memory that is larger in size than the real memory of a computer. Its use enables a programmer to
execute a program whose size may exceed the size of real memory.
Some operating systems create virtual machines (VMs) so that each machine can be allocated
to a user. The advantage of this approach is twofold.
Allocation of a virtual machine to each user eliminates mutual interference between users. It
also allows each user to select an OS of his choice to operate his virtual machine. In effect, this
arrangement permits users to use different operating systems on the same computer system
simultaneously
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 17
Operating System: Introduction
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management Resource management Security and protection
An OS must ensure that no person can illegally use programs and resources in the system, or interfere with
them in any manner.
The security function counters threats of illegal use or interference that are posed by persons or programs
outside the control of an operating system, whereas the protection function counters similar threats posed by its
users.
Figure illustrates how security and protection threats arise in an OS.
Overview of security and
protection threats.
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 18
Operating System: Introduction
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management Resource management Security and protection
In a classical stand-alone environment, a computer system functions in complete isolation. In such
a system, the security and protection issues can be handled easily..
The identity of a person wishing to use a computer system is verified through a password when
the person logs in. This action, which is called authentication, ensures that no person other than a
registered user can use a computer system. Consequently, security threats do not arise in the
system if the authentication procedure is foolproof.
The OS prevents disruption of program executions and OS services with the help of hardware
features such as memory protection.
It overcomes interference with files by allowing a user to access a file only if he owns it or has
been authorized by the file’s owner to access it
When a computer system is connected to the Internet, and a user downloads a program from
the Internet, there is a danger that the downloaded program may interfere with other programs
or resources in the system.
This is a security threat because the interference is caused by some person outside the system,
called an intruder, who either wrote the downloaded program, or modified it, so that it would
interfere with other programs.
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 19
Operating System: Introduction
Goals of Operating System:
operations of Operating System:
Efficient Use User Convenience Noninterference
Program management Resource management Security and protection
Another class of security threats is posed by programs called worms, which replicate by
themselves through holes in security setups of operating systems. Worms can replicate at
unimaginably high rates and cause widespread havoc. The Code Red worm of 2001 spread to a
quarter of a million computer systems in 9 hours.
Such security threats are posed either through a Trojan horse, which is a program that has a
known legitimate function and a well-disguised malicious function, or a virus, which is a piece of
code with a malicious function that attaches itself to other programs in the system and spreads to
other systems when such programs are copied.
Operating systems address security threats through a variety of means—
Users are expected to contribute to security by using passwords that are impossible to guess
and by exercising caution while downloading programs from the Internet
by using Internet firewalls to filter out unwanted Internet traffic through a computer system.
by using sophisticated authentication techniques,
by plugging security holes when they are discovered,
by ensuring that programs cannot be modified while they are copied over the Internet,
Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 20
Operating System: Introduction
Goals of an Operating System :
Operation of an Operating System: Program management Resource management Security and protection
Goals of Operating System:
operations of Operating System:
Reference
1. D.M.Dhamdhare, “Operating Systems”,
Second Edition, TMH, 2008
NoninterferenceEfficient Use User Convenience
21
Prof. Anand H. D.
M. Tech. (PhD.)
Assistant Professor,
Department of Electronics & Communication Engineering
Dr. Ambedkar Institute of Technology, Bengaluru-56
Email: anandhdece@dr-ait.org
Phone: 9844518832

More Related Content

What's hot

Apple iOS Report
Apple iOS ReportApple iOS Report
Apple iOS Report
Chetan Gowda
 
Dead Lock
Dead LockDead Lock
Dead Lock
Ramasubbu .P
 
Process scheduling algorithms
Process scheduling algorithmsProcess scheduling algorithms
Process scheduling algorithms
Shubham Sharma
 
Final year project presentation in android application
Final year project presentation in android applicationFinal year project presentation in android application
Final year project presentation in android application
Chirag Thaker
 
Process Management in Android
Process Management in AndroidProcess Management in Android
Process Management in Android
Shrey Verma
 
Online Student Feedback System
Online Student Feedback SystemOnline Student Feedback System
Online Student Feedback System
EditorIJAERD
 
Computer Maintenance Presentation.pptx
Computer Maintenance Presentation.pptxComputer Maintenance Presentation.pptx
Computer Maintenance Presentation.pptx
MAHERMOHAMED27
 
Understanding The Boot Process
Understanding The Boot ProcessUnderstanding The Boot Process
Understanding The Boot Process
Dominique Cimafranca
 
Scheduling in Android
Scheduling in AndroidScheduling in Android
Scheduling in Android
Opersys inc.
 
Hackathon nomination letter
Hackathon nomination letterHackathon nomination letter
Hackathon nomination letter
urshari
 
Ch01 introducing operating systems
Ch01 introducing operating systemsCh01 introducing operating systems
Ch01 introducing operating systems
Jacob Cadeliña
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
csk selva
 
Window scheduling algorithm
Window scheduling algorithmWindow scheduling algorithm
Window scheduling algorithm
Binal Parekh
 
Human Factors and User Interface Design
Human Factors and User Interface DesignHuman Factors and User Interface Design
Human Factors and User Interface Design
SaggitariusArrow
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architectureAbDul ThaYyal
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating Systems
Ummiya Mohammedi
 
Software engineering note
Software engineering noteSoftware engineering note
Software engineering note
Neelamani Samal
 
Data flow diagram
Data flow diagramData flow diagram
Data flow diagram
Muhammad Wajahat Bajwa
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
Dr Sandeep Kumar Poonia
 
Insulin pump overview
Insulin pump overviewInsulin pump overview
Insulin pump overview
software-engineering-book
 

What's hot (20)

Apple iOS Report
Apple iOS ReportApple iOS Report
Apple iOS Report
 
Dead Lock
Dead LockDead Lock
Dead Lock
 
Process scheduling algorithms
Process scheduling algorithmsProcess scheduling algorithms
Process scheduling algorithms
 
Final year project presentation in android application
Final year project presentation in android applicationFinal year project presentation in android application
Final year project presentation in android application
 
Process Management in Android
Process Management in AndroidProcess Management in Android
Process Management in Android
 
Online Student Feedback System
Online Student Feedback SystemOnline Student Feedback System
Online Student Feedback System
 
Computer Maintenance Presentation.pptx
Computer Maintenance Presentation.pptxComputer Maintenance Presentation.pptx
Computer Maintenance Presentation.pptx
 
Understanding The Boot Process
Understanding The Boot ProcessUnderstanding The Boot Process
Understanding The Boot Process
 
Scheduling in Android
Scheduling in AndroidScheduling in Android
Scheduling in Android
 
Hackathon nomination letter
Hackathon nomination letterHackathon nomination letter
Hackathon nomination letter
 
Ch01 introducing operating systems
Ch01 introducing operating systemsCh01 introducing operating systems
Ch01 introducing operating systems
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
 
Window scheduling algorithm
Window scheduling algorithmWindow scheduling algorithm
Window scheduling algorithm
 
Human Factors and User Interface Design
Human Factors and User Interface DesignHuman Factors and User Interface Design
Human Factors and User Interface Design
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architecture
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating Systems
 
Software engineering note
Software engineering noteSoftware engineering note
Software engineering note
 
Data flow diagram
Data flow diagramData flow diagram
Data flow diagram
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Insulin pump overview
Insulin pump overviewInsulin pump overview
Insulin pump overview
 

Similar to OS introduction

OS-Process Management
OS-Process ManagementOS-Process Management
OS-Process Management
anand hd
 
ch1.ppt
ch1.pptch1.ppt
ch1.ppt
VandanaGaria
 
OS Chapter1
OS Chapter1OS Chapter1
SISTEMAS OPERATIVOS.pptx
SISTEMAS OPERATIVOS.pptxSISTEMAS OPERATIVOS.pptx
SISTEMAS OPERATIVOS.pptx
AnalistaSoporte
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To It
Michele Thomas
 
Lecture1423726024
Lecture1423726024Lecture1423726024
Lecture1423726024
deepakjeetu
 
Operating system
Operating systemOperating system
Operating system
Ibrahim MH
 
Operating System Lecture Notes
Operating System Lecture NotesOperating System Lecture Notes
Operating System Lecture Notes
FellowBuddy.com
 
Operasting system service
Operasting system serviceOperasting system service
Operasting system service
KarthigaGunasekaran1
 
R20CSE2202-OPERATING-SYSTEMS .pdf
R20CSE2202-OPERATING-SYSTEMS        .pdfR20CSE2202-OPERATING-SYSTEMS        .pdf
R20CSE2202-OPERATING-SYSTEMS .pdf
cVan3
 
operating system notes by madhavi.pdf
operating system notes by madhavi.pdfoperating system notes by madhavi.pdf
operating system notes by madhavi.pdf
MadhaviAvhankar1
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
Ijetr021224
Ijetr021224Ijetr021224
Ijetr021224
ER Publication.org
 
Ijetr021224
Ijetr021224Ijetr021224
Operating systems introduction
Operating systems   introductionOperating systems   introduction
Operating systems introduction
veeravanithaD
 
Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Study
ijtsrd
 
RTOS for Embedded System Design
RTOS for Embedded System DesignRTOS for Embedded System Design
RTOS for Embedded System Design
anand hd
 
“Elemental elements”
“Elemental elements”“Elemental elements”
“Elemental elements”
rolly fahdial
 
Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]
Amit Gupta
 
Ch2_OS_Lecture 3.pptx
Ch2_OS_Lecture 3.pptxCh2_OS_Lecture 3.pptx
Ch2_OS_Lecture 3.pptx
AllinOne746595
 

Similar to OS introduction (20)

OS-Process Management
OS-Process ManagementOS-Process Management
OS-Process Management
 
ch1.ppt
ch1.pptch1.ppt
ch1.ppt
 
OS Chapter1
OS Chapter1OS Chapter1
OS Chapter1
 
SISTEMAS OPERATIVOS.pptx
SISTEMAS OPERATIVOS.pptxSISTEMAS OPERATIVOS.pptx
SISTEMAS OPERATIVOS.pptx
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To It
 
Lecture1423726024
Lecture1423726024Lecture1423726024
Lecture1423726024
 
Operating system
Operating systemOperating system
Operating system
 
Operating System Lecture Notes
Operating System Lecture NotesOperating System Lecture Notes
Operating System Lecture Notes
 
Operasting system service
Operasting system serviceOperasting system service
Operasting system service
 
R20CSE2202-OPERATING-SYSTEMS .pdf
R20CSE2202-OPERATING-SYSTEMS        .pdfR20CSE2202-OPERATING-SYSTEMS        .pdf
R20CSE2202-OPERATING-SYSTEMS .pdf
 
operating system notes by madhavi.pdf
operating system notes by madhavi.pdfoperating system notes by madhavi.pdf
operating system notes by madhavi.pdf
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Ijetr021224
Ijetr021224Ijetr021224
Ijetr021224
 
Ijetr021224
Ijetr021224Ijetr021224
Ijetr021224
 
Operating systems introduction
Operating systems   introductionOperating systems   introduction
Operating systems introduction
 
Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Study
 
RTOS for Embedded System Design
RTOS for Embedded System DesignRTOS for Embedded System Design
RTOS for Embedded System Design
 
“Elemental elements”
“Elemental elements”“Elemental elements”
“Elemental elements”
 
Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]
 
Ch2_OS_Lecture 3.pptx
Ch2_OS_Lecture 3.pptxCh2_OS_Lecture 3.pptx
Ch2_OS_Lecture 3.pptx
 

More from anand hd

RMV sensors
RMV sensorsRMV sensors
RMV sensors
anand hd
 
RMV robot programming
RMV robot programmingRMV robot programming
RMV robot programming
anand hd
 
Robot applications
Robot applicationsRobot applications
Robot applications
anand hd
 
RMV Mechanics
RMV MechanicsRMV Mechanics
RMV Mechanics
anand hd
 
Robot Machine Vision
Robot Machine VisionRobot Machine Vision
Robot Machine Vision
anand hd
 
RMV Artificial Intelligence
RMV Artificial IntelligenceRMV Artificial Intelligence
RMV Artificial Intelligence
anand hd
 
OS file systems
OS file systemsOS file systems
OS file systems
anand hd
 
OS virtual memory
OS virtual memoryOS virtual memory
OS virtual memory
anand hd
 
OS scheduling
OS schedulingOS scheduling
OS scheduling
anand hd
 
OS Memory Management
OS Memory ManagementOS Memory Management
OS Memory Management
anand hd
 
Modules and ports in Verilog HDL
Modules and ports in Verilog HDLModules and ports in Verilog HDL
Modules and ports in Verilog HDL
anand hd
 
Characteristics and Quality Attributes of Embedded System
Characteristics and Quality Attributes of Embedded SystemCharacteristics and Quality Attributes of Embedded System
Characteristics and Quality Attributes of Embedded System
anand hd
 
Basic concepts in Verilog HDL
Basic concepts in Verilog HDLBasic concepts in Verilog HDL
Basic concepts in Verilog HDL
anand hd
 
Overview of digital design with Verilog HDL
Overview of digital design with Verilog HDLOverview of digital design with Verilog HDL
Overview of digital design with Verilog HDL
anand hd
 
Typical Embedded System
Typical Embedded SystemTypical Embedded System
Typical Embedded System
anand hd
 
Robotics Endeffectors
Robotics EndeffectorsRobotics Endeffectors
Robotics Endeffectors
anand hd
 
Fundamentals of Robotics and Machine Vision System
Fundamentals of Robotics and Machine Vision SystemFundamentals of Robotics and Machine Vision System
Fundamentals of Robotics and Machine Vision System
anand hd
 
Robotics and Automation Introduction
Robotics and Automation IntroductionRobotics and Automation Introduction
Robotics and Automation Introduction
anand hd
 
Programmable Logic Devices
Programmable Logic DevicesProgrammable Logic Devices
Programmable Logic Devices
anand hd
 
Logic synthesis using Verilog HDL
Logic synthesis using Verilog HDLLogic synthesis using Verilog HDL
Logic synthesis using Verilog HDL
anand hd
 

More from anand hd (20)

RMV sensors
RMV sensorsRMV sensors
RMV sensors
 
RMV robot programming
RMV robot programmingRMV robot programming
RMV robot programming
 
Robot applications
Robot applicationsRobot applications
Robot applications
 
RMV Mechanics
RMV MechanicsRMV Mechanics
RMV Mechanics
 
Robot Machine Vision
Robot Machine VisionRobot Machine Vision
Robot Machine Vision
 
RMV Artificial Intelligence
RMV Artificial IntelligenceRMV Artificial Intelligence
RMV Artificial Intelligence
 
OS file systems
OS file systemsOS file systems
OS file systems
 
OS virtual memory
OS virtual memoryOS virtual memory
OS virtual memory
 
OS scheduling
OS schedulingOS scheduling
OS scheduling
 
OS Memory Management
OS Memory ManagementOS Memory Management
OS Memory Management
 
Modules and ports in Verilog HDL
Modules and ports in Verilog HDLModules and ports in Verilog HDL
Modules and ports in Verilog HDL
 
Characteristics and Quality Attributes of Embedded System
Characteristics and Quality Attributes of Embedded SystemCharacteristics and Quality Attributes of Embedded System
Characteristics and Quality Attributes of Embedded System
 
Basic concepts in Verilog HDL
Basic concepts in Verilog HDLBasic concepts in Verilog HDL
Basic concepts in Verilog HDL
 
Overview of digital design with Verilog HDL
Overview of digital design with Verilog HDLOverview of digital design with Verilog HDL
Overview of digital design with Verilog HDL
 
Typical Embedded System
Typical Embedded SystemTypical Embedded System
Typical Embedded System
 
Robotics Endeffectors
Robotics EndeffectorsRobotics Endeffectors
Robotics Endeffectors
 
Fundamentals of Robotics and Machine Vision System
Fundamentals of Robotics and Machine Vision SystemFundamentals of Robotics and Machine Vision System
Fundamentals of Robotics and Machine Vision System
 
Robotics and Automation Introduction
Robotics and Automation IntroductionRobotics and Automation Introduction
Robotics and Automation Introduction
 
Programmable Logic Devices
Programmable Logic DevicesProgrammable Logic Devices
Programmable Logic Devices
 
Logic synthesis using Verilog HDL
Logic synthesis using Verilog HDLLogic synthesis using Verilog HDL
Logic synthesis using Verilog HDL
 

Recently uploaded

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 

Recently uploaded (20)

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 

OS introduction

  • 1. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 OPERATING SYSTEM Mr. Anand H. D. 1 Operating System: Introduction Department of Electronics & Communication Engineering Dr. Ambedkar Institute of Technology Bengaluru-56
  • 2. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 2 Operating System: Introduction Goals of an Operating System : Efficient Use User Convenience Noninterference Operation of an Operating System: Program management Resource management Security and protection Topics to be covered: Goals of an Operating System Operation of an Operating System https://youtu.be/pTdSs8kQqSA
  • 3. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 3 Operating System: Introduction Goals of an Operating System : User Convenience Noninterference Operation of an Operating System: Program management Resource management Security and protection Goals of Operating System: Efficient Use  The fundamental goals of an operating system are: • Efficient use • User convenience • Noninterference  The goals of efficient use and user convenience sometimes conflict. For example, emphasis on quick service would lead to inefficient use of resources, the designer has to make a trade-off to obtain the combination of efficient use and user convenience that best suits the environment-effective utilization of the computer system. Interference with a user’s activities:- Operating Systems: illegal use or modification of a user’s programs or data, denial of resources and services to a user. : Ensure efficient use of a computer’s resources. : Provide convenient methods of using a computer system. : Prevent interference in the activities of its users. fast service required by command and control applications, make efficient use of computer resources to provide low-cost computing provide different combinations of the two extremes
  • 4. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 4 Operating System: Introduction Goals of an Operating System : User Convenience Noninterference Operation of an Operating System: Program management Resource management Security and protection Goals of Operating System: Efficient Use An operating system must ensure efficient use of the fundamental computer system resources of memory, CPU, and I/O devices such as disks and printers. Poor efficiency can result if a program does not use a resource allocated to it, e.g., if memory or I/O devices allocated to a program remain idle - leads to snowballing effect In addition, the OS itself consumes some CPU and memory resources during its own operation, and this consumption of resources constitutes an overhead that also reduces the resources available to user programs. Efficient use of resources can be obtained by monitoring use of resources and performing corrective actions when necessary. However, monitoring use of resources increases the overhead, which lowers efficiency of use. In practice, operating systems that emphasize efficient use limit their overhead by either restricting their focus to efficiency of a few important resources, like the CPU and the memory, or by not monitoring the use of resources at all, and instead handling user programs and resources in a manner that guarantees high efficiency
  • 5. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 5 Operating System: Introduction Goals of an Operating System : Noninterference Operation of an Operating System: Program management Resource management Security and protection Goals of Operating System: Efficient Use User Convenience User convenience has many facets, as shown in following Table: Fulfillment of necessity Good Service User friendly interfaces New programming model Web-oriented features Evolution Ability to execute programs, use the file system Speedy response to computational requests Easy-to-use commands, graphical user interface (GUI) Concurrent programming Means to set up Web-enabled servers Add new features, use new computer technologies Facet Examples Table: Facets of User Convenience
  • 6. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 6 Operating System: Introduction Goals of an Operating System : Noninterference Operation of an Operating System: Program management Resource management Security and protection Goals of Operating System: Efficient Use User Convenience In the early days of computing, user convenience was synonymous with bare necessity Other facets of user convenience evolved with the use of computers in new fields. Early operating systems had command-line interfaces, which required a user to type in a command and specify values of its parameters- scientists or computer professionals Simpler interfaces were needed to facilitate use of computers by new classes of users. Hence graphical user interfaces (GUIs) were evolved. These interfaces used icons on a screen to represent programs and files and interpreted mouse clicks on the icons and associated menus as commands concerning them. New models were proposed for developing cost-effective solutions to new classes of problems. Some of these models could be supported by the compiler technology and required little support from the OS; modular and object-oriented program design are two such models. Other models like the concurrent programming model required specific support features in the OS. Advent of the Internet motivated setting up of Web-enabled servers, which required networking support and an ability to scale up or scale down the performance of a server in response to the amount of load directed at it. Users and their organizations invest considerable time and effort in setting up their applications through an operating system. This investment must be protected when new application areas and new computer technologies develop,
  • 7. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 7 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Program management Resource management Security and protection Goals of Operating System: Efficient Use User Convenience Noninterference A computer user can face different kinds of interference in his computational activities. Execution of his program can be disrupted by actions of other persons, or the OS services. The OS prevents such interference by allocating resources for exclusive use of programs and OS services, and preventing illegal accesses to resources. Another form of interference is when a computer user may collaborate with some other users in the development or use of a computer application, so he may wish to share some of his files with them. Attempts by any other person to access his files are illegal and constitute interference. To prevent this form of interference, an OS has to know which files of a user can be accessed by which persons. It is achieved through the act of authorization, whereby a user specifies which collaborators can access what files. The OS uses this information to prevent illegal accesses to files.
  • 8. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 8 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Resource management Security and protection Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management The primary concerns of an OS during its operation are execution of programs, use of resources, and prevention of interference with programs and resources. Accordingly, its three principal functions are: • Program management: The OS initiates programs, arranges their execution on the CPU, and terminates them when they complete their execution. Since many programs exist in the system at any time, the OS performs a function called scheduling to select a program for execution • Resource management: The OS allocates resources like memory and I/O devices when a program needs them. When the program terminates, it de-allocates these resources and allocates them to other programs that need them. • Security and protection: The OS implements noninterference in users’ activities through joint actions of the security and protection functions. As an example, consider how the OS prevents illegal accesses to a file. The security function prevents nonusers from utilizing the services and resources in the computer system, hence none of them can access the file. The protection function prevents users other than the file owner or users authorized by him, from accessing the file.
  • 9. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 9 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Resource management Security and protection Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management Table describes the tasks commonly performed by an operating system. Construct a list of resource Maintain information for security Verify identity of a user Initiate execution of programs Maintain authorization information Perform resource allocation During booting While registering new users At user commands When a user specifies which collaborators can access what programs or data When requested by users or programs Task When performed Table: Common Tasks Performed by Operating Systems At login time Maintain current status of resources Maintain current status of programs and perform scheduling During resource allocation/de-allocation Continually during OS operation
  • 10. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 10 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Resource management Security and protection Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management When a computer system is switched on, it automatically loads a program stored on a reserved part of an I/O device, typically a disk, and starts executing the program. This program follows a software technique known as bootstrapping to load the software called the boot procedure in memory The boot procedure makes a list of all hardware resources in the system, and hands over control of the computer system to the OS. A system administrator specifies which persons are registered as users of the system. The OS permits only these persons to log in to use its resources and services. A user authorizes his collaborators to access some programs and data. The OS notes this information and uses it to implement protection. The OS also performs a set of functions to implement its notion of effective utilization. These functions include scheduling of programs and keeping track of resource status and resource usage information.
  • 11. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 11 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Resource management Security and protection Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management Modern CPUs have the capability to execute program instructions at a very high rate, so it is possible for an OS to interleave execution of several programs on a CPU and yet provide good user service. The key function in achieving interleaved execution of programs is scheduling, which decides which program should be given the CPU at any time. Figure shows an abstract view of scheduling. Figure: A schematic of scheduling. Scheduler CPU Completed Program New Program ….. Programs in ready Queue waiting for CPU Scheduled Program P1P2Pn Preempted Program
  • 12. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 12 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Resource management Security and protection Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management The scheduler, which is an OS routine that performs scheduling, maintains a list of programs waiting to execute on the CPU, and selects one program for execution. In operating systems that provide fair service to all programs, the scheduler also specifies how long the program can be allowed to use the CPU. The OS takes away the CPU from a program after it has executed for the specified period of time, and gives it to another program. This action is called preemption. A program that loses the CPU because of preemption is put back into the list of programs waiting to execute on the CPU. The scheduling policy employed by an OS can influence both efficient use of the CPU and user service. If a program is preempted after it has executed for only a short period of time, the overhead of scheduling actions would be high because of frequent preemption. However, each program would suffer only a short delay before it gets an opportunity to use the CPU, which would result in good user service. If preemption is performed after a program has executed for a longer period of time, scheduling overhead would be lesser but programs would suffer longer delays, so user service would be poorer
  • 13. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 13 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Security and protection Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management Resource management Resource allocations and de-allocations can be performed by using a resource table. Each entry in the table contains the name and address of a resource unit and its present status, indicating whether it is free or allocated to some program. Table below is one such table for management of I/O devices. It is constructed by the boot procedure by sensing the presence of I/O devices in the system, and updated by the operating system to reflect the allocations and deallocations made by it. printer1 printer2 printer3 disk1 disk2 cdw1 Resource Name AddressClass Allocation status Printer Printer Printer Disk Disk CD writer 101 102 103 201 202 301 Allocated to P1 Free Free Allocated to P1 Allocated to P2 Free Resource Table for I/O Devices
  • 14. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 14 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Security and protection Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management Resource management Two resource allocation strategies are popular. In the resource partitioning approach, the OS decides a priori what resources should be allocated to each user program, for example, it may decide that a program should be allocated 1 MB of memory, 1000 disk blocks, and a monitor. It divides the resources in the system into many resource partitions, or simply partitions; each partition includes 1 MB of memory, 1000 disk blocks, and a monitor. It allocates one resource partition to each user program when its execution is to be initiated. To facilitate resource allocation, the resource table contains entries for resource partitions rather than for individual resources as in Table shown. Resource partitioning is simple to implement, hence it incurs less overhead; however, it lacks flexibility. Resources are wasted if a resource partition contains more resources than what a program needs. Also, the OS cannot execute a program if its requirements exceed the resources available in a resource partition. This is true even if free resources exist in another partition.
  • 15. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 15 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Security and protection Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management Resource management In the pool-based approach to resource management, the OS allocates resources from a common pool of resources. It consults the resource table when a program makes a request for a resource, and allocates the resource if it is free. It incurs the overhead of allocating and de-allocating resources when requested. However, it avoids both problems faced by the resource partitioning approach— an allocated resource is not wasted, and a resource requirement can be met if a free resource exists. A virtual resource is a fictitious resource—it is an illusion supported by an OS through use of a real resource. An OS may use the same real resource to support several virtual resources. This way, it can give the impression of having a larger number of resources than it actually does. Each use of a virtual resource results in the use of an appropriate real resource. In that sense, a virtual resource is an abstract view of a resource taken by a program. Use of virtual resources started with the use of virtual devices. To prevent mutual interference between programs, it was a good idea to allocate a device exclusively for use by one program. However, a computer system did not possess many real devices, so virtual devices were used. An OS would create a virtual device when a user needed an I/O device;
  • 16. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 16 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Security and protection Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management Resource management  In Table it could be two virtual disks based on the real disk, which are allocated to programs P1 and P2, respectively. Virtual devices are used in contemporary operating systems as well. A print server is a common example of a virtual device. When a program wishes to print a file, the print server simply copies the file into the print queue. The program requesting the print goes on with its operation as if the printing had been performed. The print server continuously examines the print queue and prints the files it finds in the queue. Most operating systems provide a virtual resource called virtual memory, which is an illusion of a memory that is larger in size than the real memory of a computer. Its use enables a programmer to execute a program whose size may exceed the size of real memory. Some operating systems create virtual machines (VMs) so that each machine can be allocated to a user. The advantage of this approach is twofold. Allocation of a virtual machine to each user eliminates mutual interference between users. It also allows each user to select an OS of his choice to operate his virtual machine. In effect, this arrangement permits users to use different operating systems on the same computer system simultaneously
  • 17. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 17 Operating System: Introduction Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management Resource management Security and protection An OS must ensure that no person can illegally use programs and resources in the system, or interfere with them in any manner. The security function counters threats of illegal use or interference that are posed by persons or programs outside the control of an operating system, whereas the protection function counters similar threats posed by its users. Figure illustrates how security and protection threats arise in an OS. Overview of security and protection threats.
  • 18. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 18 Operating System: Introduction Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management Resource management Security and protection In a classical stand-alone environment, a computer system functions in complete isolation. In such a system, the security and protection issues can be handled easily.. The identity of a person wishing to use a computer system is verified through a password when the person logs in. This action, which is called authentication, ensures that no person other than a registered user can use a computer system. Consequently, security threats do not arise in the system if the authentication procedure is foolproof. The OS prevents disruption of program executions and OS services with the help of hardware features such as memory protection. It overcomes interference with files by allowing a user to access a file only if he owns it or has been authorized by the file’s owner to access it When a computer system is connected to the Internet, and a user downloads a program from the Internet, there is a danger that the downloaded program may interfere with other programs or resources in the system. This is a security threat because the interference is caused by some person outside the system, called an intruder, who either wrote the downloaded program, or modified it, so that it would interfere with other programs.
  • 19. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 19 Operating System: Introduction Goals of Operating System: operations of Operating System: Efficient Use User Convenience Noninterference Program management Resource management Security and protection Another class of security threats is posed by programs called worms, which replicate by themselves through holes in security setups of operating systems. Worms can replicate at unimaginably high rates and cause widespread havoc. The Code Red worm of 2001 spread to a quarter of a million computer systems in 9 hours. Such security threats are posed either through a Trojan horse, which is a program that has a known legitimate function and a well-disguised malicious function, or a virus, which is a piece of code with a malicious function that attaches itself to other programs in the system and spreads to other systems when such programs are copied. Operating systems address security threats through a variety of means— Users are expected to contribute to security by using passwords that are impossible to guess and by exercising caution while downloading programs from the Internet by using Internet firewalls to filter out unwanted Internet traffic through a computer system. by using sophisticated authentication techniques, by plugging security holes when they are discovered, by ensuring that programs cannot be modified while they are copied over the Internet,
  • 20. Prepared by Prof. Anand H. D., Dept. of ECE, Dr. AIT, Bengaluru-56 20 Operating System: Introduction Goals of an Operating System : Operation of an Operating System: Program management Resource management Security and protection Goals of Operating System: operations of Operating System: Reference 1. D.M.Dhamdhare, “Operating Systems”, Second Edition, TMH, 2008 NoninterferenceEfficient Use User Convenience
  • 21. 21 Prof. Anand H. D. M. Tech. (PhD.) Assistant Professor, Department of Electronics & Communication Engineering Dr. Ambedkar Institute of Technology, Bengaluru-56 Email: anandhdece@dr-ait.org Phone: 9844518832