SlideShare a Scribd company logo
Presenting to:-
Prof. Ram Kumar
Paliwal
Presented by:-
Saurabh Soni
B.C.A. 4th(B)
System services :- the OS provides the environment for the
execution of program. It provides users the services to execute
the programs in a convenient manner. The specific services
provided will different form one to another OS ,but there are
some common services of OS that we can identify .these OS
services are provided for the convenience of the programmer ,to
make the programming task easier.
Program execution
Input/Output operation
File-system manipulation
Communications
Error detection
Resource allocation
Protection
Program execution :-The purpose of computer system is to allow
the users to execute programs in an efficient manner. The operating
system provides an environment where the user can conveniently run
these programs. The user doesn’t have to worry about
the memory allocation or de-allocation or any other thing because these
things are taken care by the operating system.
 To run program , first loaded into the RAM and then to assign CPU time for
its execution.
 other important tasks like allocation and de-allocation of memory, CPU
scheduling etc perform OS itself.
Input/Output operation :-Each program requires an input and after
processing the input submitted by user it produces output. The operating
system hides the user from all these details of underlying hardware for the
I/O. So the operating system makes the users convenient to run programs
by providing I/O functions. The I/O service cannot be provided by user-level
programs and it must be provided by the operating system.
File-system manipulation :-While working on the computer, generally a user is
required to manipulate various types of files like as opening a file, saving a file
and deleting a file from the storage disk. This is an important task that is also
performed by the operating system.
Thus operating system makes it easier for the user programs to accomplish their
task by providing the file system manipulation service. This service is performed
by the 'Secondary Storage Management' a part of the operating system.
Communications :-Operating system performs the communication among various
types of processes in the form of shared memory. In multitasking environment,
the processes need to communicate with each other and to exchange
their information. These processes are created under a hierarchical structure
where the main process is known as parent process and the sub processes are
known as child processes.
Error detection :-OS also deals with hardware problems. To avoid hardware
problems the OS constantly monitors the system for detecting the errors and
fixing these errors (if found). The main function of OS is to detect the errors
like bad sectors on hard disk, memory overflow and errors related to I/O
devices. After detecting the errors, OS takes an appropriate action for
consistent computing.
This service of error detection and error correction cannot be handled by
user programs because it involves monitoring the entire computing process.
These tasks are too critical to be handed over to the user programs.
Resource allocation :-In the multitasking environment, when multiple jobs are
running at a time, it is the responsibility of an OS to allocate the required
resources (like as CPU, main memory, tape drive or secondary storage etc.)
to each process for its better utilization. For this purpose various types of
algorithms are implemented such as process scheduling, CPU scheduling,
disk scheduling etc.
Protection :-If a computer system has multiple users and allows the
concurrent execution of multiple processes, then the various processes
must be protected from one another's activities.
System calls provide the interface b/w a process and OS .these calls are generally available
as assembly-language instructions .these are usually listen in the manuals used by
assembly-language programmers.
Some system may allow system calls to be made directly from a higher level language
program .they may generate a call to a special run-time routine that makes the system
call or the system call may be generated directly in-line.
C(Compiler) , Bliss(Basic Language for Implementation of System Software)
BCPL (Basic Combined Programming Language)
PERL(Practical Extraction and Reporting Language)
These language are defined to replace assembly language for system programming .some
Pascal also provide an ability to make system calls directly form a Pascal program to the
OS.
 To understand system calls, first one needs to understand the difference between kernel
mode and user mode of a CPU.
 System Call
 When a program in user mode requires access to RAM or a hardware resource, it must ask
the kernel to provide access to that resource. This is done via something called a system
call.
 When a program makes a system call, the mode is switched from user mode to kernel mode.
This is called a context switch.
 Generally, system calls are made by the user level programs in the following situations:
A. Creating, opening, closing and deleting files in the file system.
B. Creating and managing new processes.
C. Creating a connection in the network, sending and receiving packets.
D. Requesting access to a hardware device, like a mouse or a printer.
E. system supports these two modes.
Kernel Mode
When CPU is in kernel mode, the code being executed can access any memory
address and any hardware resource.
• It is a very privileged and powerful mode.
• If a program crashes in kernel mode, the entire system will be halted.
User Mode
When CPU is in user mode, the programs don’t have access to memory and
hardware resources .
In user mode, if any program crashes, only that particular program is halted.
That means the system will be in a safe state even if
a program in user mode crashes .most
programs in an OS run in user mode.
services and system calls of operating system

More Related Content

What's hot

Os structure
Os structureOs structure
Os structureMohd Arif
 
Chapter 3 - Processes
Chapter 3 - ProcessesChapter 3 - Processes
Chapter 3 - Processes
Wayne Jones Jnr
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
Student
 
SCHEDULING ALGORITHMS
SCHEDULING ALGORITHMSSCHEDULING ALGORITHMS
SCHEDULING ALGORITHMS
Dhaval Sakhiya
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecture
venkateswarlu G
 
Contiguous Memory Allocation.ppt
Contiguous Memory Allocation.pptContiguous Memory Allocation.ppt
Contiguous Memory Allocation.ppt
infomerlin
 
Swapping | Computer Science
Swapping | Computer ScienceSwapping | Computer Science
Swapping | Computer Science
Transweb Global Inc
 
Kernel (OS)
Kernel (OS)Kernel (OS)
Threads (operating System)
Threads (operating System)Threads (operating System)
Threads (operating System)
Prakhar Maurya
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
Sayed Chhattan Shah
 
Deadlock Prevention
Deadlock PreventionDeadlock Prevention
Deadlock Prevention
prachi mewara
 
System call
System callSystem call
System call
shahadat hossain
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
 
CS9222 Advanced Operating System
CS9222 Advanced Operating SystemCS9222 Advanced Operating System
CS9222 Advanced Operating System
Kathirvel Ayyaswamy
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
mrzahidfaiz.blogspot.com
 
Multi Processors And Multi Computers
 Multi Processors And Multi Computers Multi Processors And Multi Computers
Multi Processors And Multi Computers
Nemwos
 

What's hot (20)

Os structure
Os structureOs structure
Os structure
 
Chapter 3 - Processes
Chapter 3 - ProcessesChapter 3 - Processes
Chapter 3 - Processes
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
SCHEDULING ALGORITHMS
SCHEDULING ALGORITHMSSCHEDULING ALGORITHMS
SCHEDULING ALGORITHMS
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecture
 
operating system lecture notes
operating system lecture notesoperating system lecture notes
operating system lecture notes
 
Contiguous Memory Allocation.ppt
Contiguous Memory Allocation.pptContiguous Memory Allocation.ppt
Contiguous Memory Allocation.ppt
 
Swapping | Computer Science
Swapping | Computer ScienceSwapping | Computer Science
Swapping | Computer Science
 
Kernel (OS)
Kernel (OS)Kernel (OS)
Kernel (OS)
 
Threads (operating System)
Threads (operating System)Threads (operating System)
Threads (operating System)
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
 
Deadlock Prevention
Deadlock PreventionDeadlock Prevention
Deadlock Prevention
 
System call
System callSystem call
System call
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
CS9222 Advanced Operating System
CS9222 Advanced Operating SystemCS9222 Advanced Operating System
CS9222 Advanced Operating System
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Memory management
Memory managementMemory management
Memory management
 
Multi Processors And Multi Computers
 Multi Processors And Multi Computers Multi Processors And Multi Computers
Multi Processors And Multi Computers
 

Similar to services and system calls of operating system

operatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptxoperatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptx
krishnajoshi70
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
Soumit Ghosh
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's uses
Surya Vishnuram
 
R20CSE2202-OPERATING-SYSTEMS .pdf
R20CSE2202-OPERATING-SYSTEMS        .pdfR20CSE2202-OPERATING-SYSTEMS        .pdf
R20CSE2202-OPERATING-SYSTEMS .pdf
cVan3
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
Kirti Verma
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)Sohaib Danish
 
OS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptxOS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptx
PRABAVATHIH
 
e.pdf
e.pdfe.pdf
e.pdf
ay3539355
 
os mod1 notes
 os mod1 notes os mod1 notes
os mod1 notes
SRINIVASUNIVERSITYEN
 
Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]
Amit Gupta
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
Jaleto Sunkemo
 
Spr ch-01
Spr ch-01Spr ch-01
Spr ch-01
Vasim Pathan
 
Introduction of operating system
Introduction of operating systemIntroduction of operating system
Introduction of operating system
Jitendrakumar Upadhyay
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
Jasleen Kaur (Chandigarh University)
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OSC.U
 

Similar to services and system calls of operating system (20)

operatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptxoperatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptx
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
 
Ch3
Ch3Ch3
Ch3
 
Ch1
Ch1Ch1
Ch1
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's uses
 
R20CSE2202-OPERATING-SYSTEMS .pdf
R20CSE2202-OPERATING-SYSTEMS        .pdfR20CSE2202-OPERATING-SYSTEMS        .pdf
R20CSE2202-OPERATING-SYSTEMS .pdf
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)
 
Ch1
Ch1Ch1
Ch1
 
OS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptxOS UNIT 1 PPT.pptx
OS UNIT 1 PPT.pptx
 
e.pdf
e.pdfe.pdf
e.pdf
 
os mod1 notes
 os mod1 notes os mod1 notes
os mod1 notes
 
Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
 
Spr ch-01
Spr ch-01Spr ch-01
Spr ch-01
 
Introduction of operating system
Introduction of operating systemIntroduction of operating system
Introduction of operating system
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
 
OS_Ch3
OS_Ch3OS_Ch3
OS_Ch3
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

services and system calls of operating system

  • 1. Presenting to:- Prof. Ram Kumar Paliwal Presented by:- Saurabh Soni B.C.A. 4th(B)
  • 2. System services :- the OS provides the environment for the execution of program. It provides users the services to execute the programs in a convenient manner. The specific services provided will different form one to another OS ,but there are some common services of OS that we can identify .these OS services are provided for the convenience of the programmer ,to make the programming task easier.
  • 3. Program execution Input/Output operation File-system manipulation Communications Error detection Resource allocation Protection
  • 4. Program execution :-The purpose of computer system is to allow the users to execute programs in an efficient manner. The operating system provides an environment where the user can conveniently run these programs. The user doesn’t have to worry about the memory allocation or de-allocation or any other thing because these things are taken care by the operating system.  To run program , first loaded into the RAM and then to assign CPU time for its execution.  other important tasks like allocation and de-allocation of memory, CPU scheduling etc perform OS itself.
  • 5. Input/Output operation :-Each program requires an input and after processing the input submitted by user it produces output. The operating system hides the user from all these details of underlying hardware for the I/O. So the operating system makes the users convenient to run programs by providing I/O functions. The I/O service cannot be provided by user-level programs and it must be provided by the operating system.
  • 6. File-system manipulation :-While working on the computer, generally a user is required to manipulate various types of files like as opening a file, saving a file and deleting a file from the storage disk. This is an important task that is also performed by the operating system. Thus operating system makes it easier for the user programs to accomplish their task by providing the file system manipulation service. This service is performed by the 'Secondary Storage Management' a part of the operating system. Communications :-Operating system performs the communication among various types of processes in the form of shared memory. In multitasking environment, the processes need to communicate with each other and to exchange their information. These processes are created under a hierarchical structure where the main process is known as parent process and the sub processes are known as child processes.
  • 7. Error detection :-OS also deals with hardware problems. To avoid hardware problems the OS constantly monitors the system for detecting the errors and fixing these errors (if found). The main function of OS is to detect the errors like bad sectors on hard disk, memory overflow and errors related to I/O devices. After detecting the errors, OS takes an appropriate action for consistent computing. This service of error detection and error correction cannot be handled by user programs because it involves monitoring the entire computing process. These tasks are too critical to be handed over to the user programs.
  • 8. Resource allocation :-In the multitasking environment, when multiple jobs are running at a time, it is the responsibility of an OS to allocate the required resources (like as CPU, main memory, tape drive or secondary storage etc.) to each process for its better utilization. For this purpose various types of algorithms are implemented such as process scheduling, CPU scheduling, disk scheduling etc. Protection :-If a computer system has multiple users and allows the concurrent execution of multiple processes, then the various processes must be protected from one another's activities.
  • 9. System calls provide the interface b/w a process and OS .these calls are generally available as assembly-language instructions .these are usually listen in the manuals used by assembly-language programmers. Some system may allow system calls to be made directly from a higher level language program .they may generate a call to a special run-time routine that makes the system call or the system call may be generated directly in-line. C(Compiler) , Bliss(Basic Language for Implementation of System Software) BCPL (Basic Combined Programming Language) PERL(Practical Extraction and Reporting Language) These language are defined to replace assembly language for system programming .some Pascal also provide an ability to make system calls directly form a Pascal program to the OS.
  • 10.  To understand system calls, first one needs to understand the difference between kernel mode and user mode of a CPU.  System Call  When a program in user mode requires access to RAM or a hardware resource, it must ask the kernel to provide access to that resource. This is done via something called a system call.  When a program makes a system call, the mode is switched from user mode to kernel mode. This is called a context switch.  Generally, system calls are made by the user level programs in the following situations: A. Creating, opening, closing and deleting files in the file system. B. Creating and managing new processes. C. Creating a connection in the network, sending and receiving packets. D. Requesting access to a hardware device, like a mouse or a printer. E. system supports these two modes.
  • 11. Kernel Mode When CPU is in kernel mode, the code being executed can access any memory address and any hardware resource. • It is a very privileged and powerful mode. • If a program crashes in kernel mode, the entire system will be halted. User Mode When CPU is in user mode, the programs don’t have access to memory and hardware resources . In user mode, if any program crashes, only that particular program is halted. That means the system will be in a safe state even if a program in user mode crashes .most programs in an OS run in user mode.