SlideShare a Scribd company logo
STRUCTURE OF AN
OPERATING SYSTEM
BY SIVANI M
An operating system has a complex structure, so we need a well-defined
structure to assist us in applying it to our unique requirements. Just as we
break down a big problem into smaller, easier-to-solve subproblems,
designing an operating system in parts is a simpler approach to do it. And each
section is an Operating System component. The approach of interconnecting
and integrating multiple operating system components into the kernel can be
described as an operating system structure. As mentioned below, various sorts
of structures are used to implement operating systems.
Different structures
•Simple Structure
•Monolithic Structure
•Layered Approach Structure
•Micro-kernel Structure
Simple Structure
It is the simplest Operating System Structure and is not well defined; It can only be used for small
and limited systems. In this structure, the interfaces and levels of functionality are well separated;
hence programs can access I/O routines which can cause unauthorized access to I/O routines.
This structure is implemented in MS-DOS operating system:
•The MS-DOS operating System is made up of various layers, each with its own set of functions.
•These layers are:
• Application Program
• System Program
• MS-DOS device drivers
• ROM BIOS device drivers
•Layering has an advantage in the MS-DOS operating system since all the levels can be defined
separately and can interact with each other when needed.
•It is easier to design, maintain, and update the system if it is made in layers. So that's why limited
systems with less complexity can be constructed easily using Simple Structure.
•If one user program fails, the entire operating system gets crashed.
•The abstraction level in MS-DOS systems is low, so programs and I/O routines are visible to the
end-user, so the user can have unauthorized access.
Layering in simple structure is shown below
Monolithic Structure
The Monolithic operating System in which the kernel acts as a manager by managing all things
like file management, memory management, device management, and operational processes of the
Operating System.
The kernel is the heart of a computer operating system (OS). Kernel delivers basic services to all
other elements of the System. It serves as the primary interface between the Operating System and
the hardware.
In monolithic systems, kernels can directly access all the resources of the operating System
like physical hardware, exp Keyboard, Mouse etc.
The monolithic kernel is another name for the monolithic operating system. Batch
processing and time-sharing maximize the usability of a processor by multiprogramming. The
monolithic kernel functions as a virtual machine by working on top of the Operating System and
controlling all hardware components. This is an outdated operating system that was used in banks
to accomplish minor activities such as batch processing and time-sharing, which enables many
people at various terminals to access the Operating System.
A Diagram of the Monolithic structure is shown
below:
Layered Approach
In this type of structure, OS is divided into layers or levels. The hardware is on the bottom layer (layer 0),
while the user interface is on the top layer (layer N). These layers are arranged in a hierarchical way in
which the top-level layers use the functionalities of their lower-level levels.
In this approach, functionalities of each layer are isolated, and abstraction is also available. In layered
structure, debugging is easier as it is a hierarchical model, so all lower-level layered is debugged, and then
the upper layer is checked. So all the lower layers are already checked, and the current layer is to be
checked only.
Micro-kernel
Micro-Kernel structure designs the Operating System by removing all non-essential components of
the kernel. These non-essential components of kernels are implemented as systems and user programs.
Hence these implemented systems are called as Micro-Kernels.
Each Micro-Kernel is made independently and is isolated from other Micro-Kernels. So this makes the
system more secure and reliable. If any Micro-Kernel fails, then the remaining operating System remains
untouched and works fine.
Operating System Debugging
Debugging is the process of finding the problems in a computer system and solving them. There are many
different ways in which operating systems perform debugging. Some of these are −
Log Files
The log files record all the events that occur in an operating system. This is done by writing all the
messages into a log file. There are different types of log files. Some of these are given as follows −
Event Logs
These stores the records of all the events that occur in the execution of a system. This is done so
that the activities of all the events can be understood to diagnose problems.
Transaction Logs
The transaction logs store the changes to the data so that the system can recover from crashes
and other errors. These logs are readable by a human.
Message Logs
These logs store both the public and private messages between the users. They are mostly plain
text files, but in some cases they may be HTML files.
Core Dump Files
The core dump files contain the memory address space of a process that terminates unexpectedly. The
creation of the core dump is triggered in response to program crashes by the kernel. The core dump files
are used by the developers to find the program’s state at the time of its termination so that they can find
out why the termination occurred.
The automatic creation of the core dump files can be disabled by the users. This may be done to improve
performance, clear disk space or increase security.
Crash Dump Files
In the event of a total system failure, the information about the state of the operating system
is captured in crash dump files. There are three types of dump that can be captured when a
system crashes. These are −
Complete Memory Dump
The whole contents of the physical memory at the time of the system crash are captured in the
complete memory dump. This is the default setting on the Windows Server System.
Kernel Memory Dump
Only the kernel mode read and write pages that are present in the main memory at the time of
the system crash are stored in the kernel memory dump.
Small Memory Dump
This memory dump contains the list of device drivers, stop code, process and thread information, kernel
stack etc.
Trace Listings
The trace listing record information about a program execution using logging. This information is used
by programmers for debugging. System administrators and technical personnel can use the trace listings
to find the common problems with software using software monitoring tools.
Profiling
This is a type of program analysis that measures various parameters in a program such as space and time
complexity, frequency and duration of function calls, usage of specific instructions etc. Profiling is done
by monitoring the source code of the required system program using a code profiler.
SYSTEM BOOT
• The BIOS, operating system and hardware components of a computer system should all be working
correctly for it to boot. If any of these elements fail, it leads to a failed boot seq.
System boot process
The following diagram demonstrates the steps involved in a system boot process −
•The CPU initializes itself after the power in the computer is first turned on. This is done by
triggering a series of clock ticks that are generated by the system clock.
•After this, the CPU looks for the system’s ROM BIOS to obtain the first instruction in the start-up
program. This first instruction is stored in the ROM BIOS and it instructs the system to run POST
(Power On Self Test) in a memory address that is predetermined.
•POST first checks the BIOS chip and then the CMOS RAM. If there is no battery failure detected
by POST, then it continues to initialize the CPU.
•POST also checks the hardware devices, secondary storage devices such as hard drives, ports etc.
And other hardware devices such as the mouse and keyboard. This is done to make sure they are
working properly.
•After POST makes sure that all the components are working properly, then the BIOS finds an
operating system to load.
•In most computer system’s, the operating system loads from the C drive onto the hard drive. The
CMOS chip typically tells the BIOS where the operating system is found.
•The order of the different drives that CMOS looks at while finding the operating system is known
as the boot sequence. This sequence can be changed by changing the CMOS setup.
•After finding the appropriate boot drive, the BIOS first finds the boot record which tells it to find
the beginning of the operating system.
•After the initialization of the operating system, the BIOS copies the files into the memory. Then the
operating system controls the boot process.
•In the end, the operating system does a final inventory of the system memory and loads the device
drivers needed to control the peripheral devices.
•The users can access the system applications to perform various tasks.
Without the system boot process, the computer users would have to download all the software
components, including the ones not frequently required. With the system boot, only those software
components need to be downloaded that are legitimately required and all extraneous components are
not required. This process frees up a lot of space in the memory and consequently saves a lot of time.

More Related Content

Similar to Structure of an operating system.pptx

OS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.pptOS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.ppt
naghamallella
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
AshmitKashyap1
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
AshmitKashyap1
 
operating system1.pdf
operating system1.pdfoperating system1.pdf
operating system1.pdf
Ganesh198271
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's uses
Surya Vishnuram
 
1. What is the value of requiring the OS to provide status informati.pdf
1. What is the value of requiring the OS to provide status informati.pdf1. What is the value of requiring the OS to provide status informati.pdf
1. What is the value of requiring the OS to provide status informati.pdf
udit652068
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System
MaqdamYasir
 
lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categories
WajeehaBaig
 
OS Structure
OS StructureOS Structure
OS Structure
Ajay Singh Rana
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
services and system calls of operating system
services and system calls of operating system services and system calls of operating system
services and system calls of operating system
Saurabh Soni
 
Introduction to OS.pptx
Introduction to OS.pptxIntroduction to OS.pptx
Introduction to OS.pptx
taruian
 
OS.pptx
OS.pptxOS.pptx
OS.pptx
abclara
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
StBulteBelay
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
StBulteBelay
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
Kirti Verma
 
OS_Intro_Chap_1.ppt
OS_Intro_Chap_1.pptOS_Intro_Chap_1.ppt
OS_Intro_Chap_1.ppt
DrAmarNathDhebla
 
Operating System 2.pptx
Operating System 2.pptxOperating System 2.pptx
Operating System 2.pptx
GevitaChinnaiah
 
Ch1 - OS.pdf
Ch1 - OS.pdfCh1 - OS.pdf
Ch1 - OS.pdf
OmarKamil1
 

Similar to Structure of an operating system.pptx (20)

OS-20210426203801.ppt
OS-20210426203801.pptOS-20210426203801.ppt
OS-20210426203801.ppt
 
OS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.pptOS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.ppt
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
operating system1.pdf
operating system1.pdfoperating system1.pdf
operating system1.pdf
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's uses
 
1. What is the value of requiring the OS to provide status informati.pdf
1. What is the value of requiring the OS to provide status informati.pdf1. What is the value of requiring the OS to provide status informati.pdf
1. What is the value of requiring the OS to provide status informati.pdf
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System
 
lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categories
 
OS Structure
OS StructureOS Structure
OS Structure
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
services and system calls of operating system
services and system calls of operating system services and system calls of operating system
services and system calls of operating system
 
Introduction to OS.pptx
Introduction to OS.pptxIntroduction to OS.pptx
Introduction to OS.pptx
 
OS.pptx
OS.pptxOS.pptx
OS.pptx
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
 
OS_Intro_Chap_1.ppt
OS_Intro_Chap_1.pptOS_Intro_Chap_1.ppt
OS_Intro_Chap_1.ppt
 
Operating System 2.pptx
Operating System 2.pptxOperating System 2.pptx
Operating System 2.pptx
 
Ch1 - OS.pdf
Ch1 - OS.pdfCh1 - OS.pdf
Ch1 - OS.pdf
 

More from MSivani

User and operating system interface.pptx
User and operating system interface.pptxUser and operating system interface.pptx
User and operating system interface.pptx
MSivani
 
Communication in client server system.pptx
Communication in client server system.pptxCommunication in client server system.pptx
Communication in client server system.pptx
MSivani
 
Process scheduling.pptx
Process scheduling.pptxProcess scheduling.pptx
Process scheduling.pptx
MSivani
 
REST library.pptx
REST library.pptxREST library.pptx
REST library.pptx
MSivani
 
Smart materials.pptx
Smart  materials.pptxSmart  materials.pptx
Smart materials.pptx
MSivani
 
PROJECT LOON.pptx
PROJECT LOON.pptxPROJECT LOON.pptx
PROJECT LOON.pptx
MSivani
 
Operating System Operations ppt.pptx
Operating System Operations ppt.pptxOperating System Operations ppt.pptx
Operating System Operations ppt.pptx
MSivani
 
How to Install and Set up Android Studio.pptx
How to Install and Set up Android Studio.pptxHow to Install and Set up Android Studio.pptx
How to Install and Set up Android Studio.pptx
MSivani
 
Computing Environments.pptx
Computing Environments.pptxComputing Environments.pptx
Computing Environments.pptx
MSivani
 
ppt for phase-1 review-2.pptx
ppt for phase-1 review-2.pptxppt for phase-1 review-2.pptx
ppt for phase-1 review-2.pptx
MSivani
 

More from MSivani (10)

User and operating system interface.pptx
User and operating system interface.pptxUser and operating system interface.pptx
User and operating system interface.pptx
 
Communication in client server system.pptx
Communication in client server system.pptxCommunication in client server system.pptx
Communication in client server system.pptx
 
Process scheduling.pptx
Process scheduling.pptxProcess scheduling.pptx
Process scheduling.pptx
 
REST library.pptx
REST library.pptxREST library.pptx
REST library.pptx
 
Smart materials.pptx
Smart  materials.pptxSmart  materials.pptx
Smart materials.pptx
 
PROJECT LOON.pptx
PROJECT LOON.pptxPROJECT LOON.pptx
PROJECT LOON.pptx
 
Operating System Operations ppt.pptx
Operating System Operations ppt.pptxOperating System Operations ppt.pptx
Operating System Operations ppt.pptx
 
How to Install and Set up Android Studio.pptx
How to Install and Set up Android Studio.pptxHow to Install and Set up Android Studio.pptx
How to Install and Set up Android Studio.pptx
 
Computing Environments.pptx
Computing Environments.pptxComputing Environments.pptx
Computing Environments.pptx
 
ppt for phase-1 review-2.pptx
ppt for phase-1 review-2.pptxppt for phase-1 review-2.pptx
ppt for phase-1 review-2.pptx
 

Recently uploaded

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

Structure of an operating system.pptx

  • 1. STRUCTURE OF AN OPERATING SYSTEM BY SIVANI M
  • 2. An operating system has a complex structure, so we need a well-defined structure to assist us in applying it to our unique requirements. Just as we break down a big problem into smaller, easier-to-solve subproblems, designing an operating system in parts is a simpler approach to do it. And each section is an Operating System component. The approach of interconnecting and integrating multiple operating system components into the kernel can be described as an operating system structure. As mentioned below, various sorts of structures are used to implement operating systems. Different structures •Simple Structure •Monolithic Structure •Layered Approach Structure •Micro-kernel Structure
  • 3. Simple Structure It is the simplest Operating System Structure and is not well defined; It can only be used for small and limited systems. In this structure, the interfaces and levels of functionality are well separated; hence programs can access I/O routines which can cause unauthorized access to I/O routines. This structure is implemented in MS-DOS operating system: •The MS-DOS operating System is made up of various layers, each with its own set of functions. •These layers are: • Application Program • System Program • MS-DOS device drivers • ROM BIOS device drivers •Layering has an advantage in the MS-DOS operating system since all the levels can be defined separately and can interact with each other when needed. •It is easier to design, maintain, and update the system if it is made in layers. So that's why limited systems with less complexity can be constructed easily using Simple Structure. •If one user program fails, the entire operating system gets crashed. •The abstraction level in MS-DOS systems is low, so programs and I/O routines are visible to the end-user, so the user can have unauthorized access.
  • 4. Layering in simple structure is shown below
  • 5. Monolithic Structure The Monolithic operating System in which the kernel acts as a manager by managing all things like file management, memory management, device management, and operational processes of the Operating System. The kernel is the heart of a computer operating system (OS). Kernel delivers basic services to all other elements of the System. It serves as the primary interface between the Operating System and the hardware. In monolithic systems, kernels can directly access all the resources of the operating System like physical hardware, exp Keyboard, Mouse etc. The monolithic kernel is another name for the monolithic operating system. Batch processing and time-sharing maximize the usability of a processor by multiprogramming. The monolithic kernel functions as a virtual machine by working on top of the Operating System and controlling all hardware components. This is an outdated operating system that was used in banks to accomplish minor activities such as batch processing and time-sharing, which enables many people at various terminals to access the Operating System.
  • 6. A Diagram of the Monolithic structure is shown below:
  • 7. Layered Approach In this type of structure, OS is divided into layers or levels. The hardware is on the bottom layer (layer 0), while the user interface is on the top layer (layer N). These layers are arranged in a hierarchical way in which the top-level layers use the functionalities of their lower-level levels. In this approach, functionalities of each layer are isolated, and abstraction is also available. In layered structure, debugging is easier as it is a hierarchical model, so all lower-level layered is debugged, and then the upper layer is checked. So all the lower layers are already checked, and the current layer is to be checked only.
  • 8. Micro-kernel Micro-Kernel structure designs the Operating System by removing all non-essential components of the kernel. These non-essential components of kernels are implemented as systems and user programs. Hence these implemented systems are called as Micro-Kernels. Each Micro-Kernel is made independently and is isolated from other Micro-Kernels. So this makes the system more secure and reliable. If any Micro-Kernel fails, then the remaining operating System remains untouched and works fine.
  • 9. Operating System Debugging Debugging is the process of finding the problems in a computer system and solving them. There are many different ways in which operating systems perform debugging. Some of these are − Log Files The log files record all the events that occur in an operating system. This is done by writing all the messages into a log file. There are different types of log files. Some of these are given as follows − Event Logs These stores the records of all the events that occur in the execution of a system. This is done so that the activities of all the events can be understood to diagnose problems. Transaction Logs The transaction logs store the changes to the data so that the system can recover from crashes and other errors. These logs are readable by a human. Message Logs These logs store both the public and private messages between the users. They are mostly plain text files, but in some cases they may be HTML files.
  • 10. Core Dump Files The core dump files contain the memory address space of a process that terminates unexpectedly. The creation of the core dump is triggered in response to program crashes by the kernel. The core dump files are used by the developers to find the program’s state at the time of its termination so that they can find out why the termination occurred. The automatic creation of the core dump files can be disabled by the users. This may be done to improve performance, clear disk space or increase security. Crash Dump Files In the event of a total system failure, the information about the state of the operating system is captured in crash dump files. There are three types of dump that can be captured when a system crashes. These are − Complete Memory Dump The whole contents of the physical memory at the time of the system crash are captured in the complete memory dump. This is the default setting on the Windows Server System. Kernel Memory Dump Only the kernel mode read and write pages that are present in the main memory at the time of the system crash are stored in the kernel memory dump.
  • 11. Small Memory Dump This memory dump contains the list of device drivers, stop code, process and thread information, kernel stack etc. Trace Listings The trace listing record information about a program execution using logging. This information is used by programmers for debugging. System administrators and technical personnel can use the trace listings to find the common problems with software using software monitoring tools. Profiling This is a type of program analysis that measures various parameters in a program such as space and time complexity, frequency and duration of function calls, usage of specific instructions etc. Profiling is done by monitoring the source code of the required system program using a code profiler.
  • 12. SYSTEM BOOT • The BIOS, operating system and hardware components of a computer system should all be working correctly for it to boot. If any of these elements fail, it leads to a failed boot seq. System boot process The following diagram demonstrates the steps involved in a system boot process −
  • 13. •The CPU initializes itself after the power in the computer is first turned on. This is done by triggering a series of clock ticks that are generated by the system clock. •After this, the CPU looks for the system’s ROM BIOS to obtain the first instruction in the start-up program. This first instruction is stored in the ROM BIOS and it instructs the system to run POST (Power On Self Test) in a memory address that is predetermined. •POST first checks the BIOS chip and then the CMOS RAM. If there is no battery failure detected by POST, then it continues to initialize the CPU. •POST also checks the hardware devices, secondary storage devices such as hard drives, ports etc. And other hardware devices such as the mouse and keyboard. This is done to make sure they are working properly. •After POST makes sure that all the components are working properly, then the BIOS finds an operating system to load. •In most computer system’s, the operating system loads from the C drive onto the hard drive. The CMOS chip typically tells the BIOS where the operating system is found. •The order of the different drives that CMOS looks at while finding the operating system is known as the boot sequence. This sequence can be changed by changing the CMOS setup. •After finding the appropriate boot drive, the BIOS first finds the boot record which tells it to find the beginning of the operating system.
  • 14. •After the initialization of the operating system, the BIOS copies the files into the memory. Then the operating system controls the boot process. •In the end, the operating system does a final inventory of the system memory and loads the device drivers needed to control the peripheral devices. •The users can access the system applications to perform various tasks. Without the system boot process, the computer users would have to download all the software components, including the ones not frequently required. With the system boot, only those software components need to be downloaded that are legitimately required and all extraneous components are not required. This process frees up a lot of space in the memory and consequently saves a lot of time.