SlideShare a Scribd company logo
Unix Operating System Overview
Mrs.Sowmya Jyothi
Faculty
Mangalore
Introduction
 Unix is a multitasking, multiuser computer operating
system developed in 1969 at AT&T(American Telephone
& Telegraph Company) Bell Labs by Ken Thompson,
Dennis Ritchie and others.
 Several people can use a Unix computer at the same
time; hence Unix is called a multiuser system. A user can
also run multiple programs at the same time; hence
Unix is a multitasking environment.
 There are various Unix variants available in the
market. Solaris Unix, AIX, HP Unix and BSD are a few
examples. Linux is also a flavor of Unix which is freely
available.
Unix Introduction
In the mid of 1965, a joint venture was undertaken by Bell
laboratories, General Electric Company and Massachusetts Institute
of Technology(MIT) to develop an operating system that could serve
a large community of users and allowed them to share data.
That OS was called as MULTICS(MULTiplexed Information of
Computing Service).
Some of the Bell Labs programmers who had worked on this project,
Dennis Ritchie, Ken Thompson, Rudd Canaday, Joe Ossanna and Doug
McIlroy designed and implemented the first multi-user operating
system on PDP-7 computers.
Brain W.Kernighan, who was connected with MULTICS, named this
OS as UNIX(UNIplexed information of computing service).
In 1971, this UNIX was ported to the PDP-11 computers.
But this version was not easy to port on new machines,
because all it’s coding were machine dependent.
To resolve this problem, Ken Thompson created a new
high-level language called “B” and rewritten the whole
UNIX code in this high-level language.
This language lacked in several features, so, Dennis Ritchie
shifted the inadequateness of B and modified it to a new
high-level language called “C”.
Finally, the UNIX is written in this “C” language to stand
tall on any machine.
Features of the Unix System
1. The system is written in a high-level language, making
it easy to read, understand, change and move to other
machines.
2. It has a simple user interface that has the power to
provide services that users want.
3. It provides primitives that permit complex programs
to be built from simpler programs
4. It uses hierarchical file system that allows easy
maintenance and efficient implementation
5. It uses a consistent format for files, making application
programs easier to write.
6. It provides a simple, consistent interface to peripheral
devices
7. It hides the machine architecture from the user,
making it easier to write programs that run on different
hardware implementations.
Operating system Services:-
1.Controlling the execution of processes by allowing their creation,
termination or suspension and communication.
2. Scheduling processes fairly for executing on the CPU. Processes
share the CPU in a time-shared manner. The CPU executes a
process, the kernel suspends it when its time quantum elapses, and
the kernel schedules another process to execute. The kernel later
reschedules the suspended process.
3. Allocating main memory for an executing process. If the system
runs low on free memory, the kernel frees memory by writing a
process temporarily to secondary memory, called a swap device. If
the kernel writes entire processes to a swap device, the
implementation of the UNIX system is called a swapping system; if
it writes pages of memory to a swap device, it is called a paging
system.
4. Allocating secondary memory for efficient storage and retrieval
of user data.
5. Allowing processes controlled access to peripheral devices such
as terminals, disk drives, tape drives and network devices.
Unix System Structure-High Level architecture
The UNIX operating system is made up of three parts; the kernel, the shell and
the programs.
The Unix system is viewed as a set of layers.
Layer-1: Hardware –
It consists of all hardware related information.
Layer-2: Kernel, the OS is commonly called the System kernel, or
Kernel. It interacts with hardware and performs most of the tasks
like memory management, task scheduling, and management
are done by the kernel. OS interacts directly with the hardware,
providing common services to programs.
Layer-3: Shell commands –
Shell is the utility that processes users requests. When you
type in a command at the terminal, the shell interprets the
command and calls the program that you want. There are various
commands like cp, mv, cat, grep, id, wc, nroff, a.out and more.
Layer-4: Application Layer –
It is the outermost layer that executes the given external
applications.
1. The hardware at the center of the diagram provides the OS with
basic services.
2. The OS interacts directly with the hardware, providing common
services to programs.
3. Viewing the system as a set of layers, the OS is commonly called the
System kernel, or Kernel.
4. Programs such as the shell and editors(ed and vi) shown in the outer
layers interact with the kernel by invoking a well defined set of
system calls. Shell is a software that lets users interact with the
operating system, usually by typing at a command line. Shell acts
like a command line interpreter. The system calls instruct the kernel
to do various operations for the calling program and exchange data
between the kernel and the program.
5. Other application programs can be built on top of lower-level
programs, hence the existence of the outermost layer in the figure.
For example, the standard C compiler, cc, is in the outermost layer in
the figure.
The Users Perspective
The Unix File System:-
The Unix file system is characterized by
1. A hierarchical structure
2. Consistent treatment of file data
3. The ability to create and delete files
4. Dynamic growth of files
5. Protection of file data
6. The treatment of peripheral devices as files
The unix file system is organized as a tree with a single
root node called root (written “/”), every non-leaf node
of the file system structure is a directory of files, and files
at the leaf nodes of the tree are either directories,
regular files or special directory files.
The name of the file is given by the path name that
describes how to locate the file in the file system
hierarchy.
A path name is a sequence of component names
separated by slash characters; a component is a sequence
of characters that designates a file name that is uniquely
contained in the previous (directory) component.
A full pathname starts with a slash character and specifies
a file that can be found by starting at the file system root
and traversing the file tree, following the branches that
lead to successive component names of the path name.
Relative pathname - A path name does not have to start
from root but can be designated relative to the current
directory.
Permission to access a file is controlled by access
permissions associated with the file. Access permissions
can be set independently to control read, write and
execute permission for 3 classes of users: the file owner,
a file group and others.
Sample File System Tree
Processing Environment:-
Everything in UNIX is either a file or a process.
A process is an executing program identified by a unique PID (process
identifier). A file is a collection of data. They are created by users using
text editors, running compilers etc. Examples of files: a document
(report, essay etc.)
The text of a program written in some high-level programming language
a directory, containing information about its contents, which may be a
mixture of other directories (subdirectories) and ordinary files.
A program is an executable file, and a process is an instance of the
program in execution.
Many processes can execute simultaneously on UNIX systems with no
logical limit to their number, and many instances of a program can exist
simultaneously in the system. Various system calls allow processes to
create new processes, terminate processes, synchronize stages of
process creation and control reaction to various events.
The system calls allow users to write programs that do
sophisticated operations. The shell is a command line
interpreter program that users typically execute after
logging into the system.
The shell allows 3 types of commands.
First, a command can be an executable file that contains
object code produced by compilation of source code.
Second, a command can be an executable file that
contains a sequence of shell command lines.
Finally, a command can be an internal shell command.
Assumptions about the hardware:
The difference between the 2 modes are:-
Processes in user mode can access their own instructions and
data but not kernel instructions and data. Processes in kernel
mode, however can access kernel and user addresses.
Some machine instructions are privileged and results in an
error when executed in user mode.
Although the system executes in one of 2 modes, the kernel
runs on behalf of a user process. The kernel is not a separate
set of processes that run in parallel to user processes, but it is
part of each user process.
References:
The design of the Unix operating system by
Maurice J. Bach

More Related Content

What's hot

UNIX Operating System
UNIX Operating SystemUNIX Operating System
UNIX Operating System
Unless Yuriko
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
Mukesh Chinta
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
Mukesh Chinta
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
vampugani
 
Processes and threads
Processes and threadsProcesses and threads
Unix ppt
Unix pptUnix ppt
Unix ppt
sudhir saurav
 
Os services
Os servicesOs services
Os services
anilkumar_mca
 
Memory management
Memory managementMemory management
Memory management
Vishal Singh
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
Wayne Jones Jnr
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresWayne Jones Jnr
 
Unix operating system
Unix operating systemUnix operating system
Unix operating system
ABhay Panchal
 
8 memory management strategies
8 memory management strategies8 memory management strategies
8 memory management strategies
Dr. Loganathan R
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
Architecture of operating system
Architecture of operating systemArchitecture of operating system
Architecture of operating system
Supriya Kumari
 
System call
System callSystem call
System call
shahadat hossain
 
Introduction to Shell script
Introduction to Shell scriptIntroduction to Shell script
Introduction to Shell script
Bhavesh Padharia
 
Operating systems (For CBSE School Students)
Operating systems (For CBSE School Students)Operating systems (For CBSE School Students)
Operating systems (For CBSE School Students)
Gaurav Aggarwal
 
30326851 -operating-system-unit-1-ppt
30326851 -operating-system-unit-1-ppt30326851 -operating-system-unit-1-ppt
30326851 -operating-system-unit-1-ppt
raj732723
 

What's hot (20)

UNIX Operating System
UNIX Operating SystemUNIX Operating System
UNIX Operating System
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Processes and threads
Processes and threadsProcesses and threads
Processes and threads
 
Unix
UnixUnix
Unix
 
Unix ppt
Unix pptUnix ppt
Unix ppt
 
Os services
Os servicesOs services
Os services
 
Memory management
Memory managementMemory management
Memory management
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
 
Unix operating system
Unix operating systemUnix operating system
Unix operating system
 
8 memory management strategies
8 memory management strategies8 memory management strategies
8 memory management strategies
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
UNIX Operating System ppt
 
Architecture of operating system
Architecture of operating systemArchitecture of operating system
Architecture of operating system
 
System call
System callSystem call
System call
 
Introduction to Shell script
Introduction to Shell scriptIntroduction to Shell script
Introduction to Shell script
 
System call
System callSystem call
System call
 
Operating systems (For CBSE School Students)
Operating systems (For CBSE School Students)Operating systems (For CBSE School Students)
Operating systems (For CBSE School Students)
 
30326851 -operating-system-unit-1-ppt
30326851 -operating-system-unit-1-ppt30326851 -operating-system-unit-1-ppt
30326851 -operating-system-unit-1-ppt
 

Similar to Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi

UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
Dr.YNM
 
LinuxOS-1 (1).ppt
LinuxOS-1 (1).pptLinuxOS-1 (1).ppt
LinuxOS-1 (1).ppt
Savitha74
 
UNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-IUNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-I
JK Knowledge
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
Nishant Munjal
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
subhsikha
 
UNIX_module1.pptx
UNIX_module1.pptxUNIX_module1.pptx
UNIX_module1.pptx
kushvithchinna900
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
amol_chavan
 
Introduction to unix (1).pptx
Introduction to unix (1).pptxIntroduction to unix (1).pptx
Introduction to unix (1).pptx
virat834293
 
Presentation1.pdf
Presentation1.pdfPresentation1.pdf
Presentation1.pdf
RahulGhosh767154
 
Spsl unit1
Spsl   unit1Spsl   unit1
Spsl unit1
Sasidhar Kothuru
 
UNIX_Module 1.pdf
UNIX_Module 1.pdfUNIX_Module 1.pdf
UNIX_Module 1.pdf
krishnaraj714229
 
Architecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxArchitecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docx
VivekGupta920049
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptx
MahiDivya
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
Rama .
 
Introduction to unix
Introduction to unixIntroduction to unix
Introduction to unix
Chandru Jangin
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptx
Harsha Patel
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptx
Harsha Patel
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
haile468688
 
3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf
DeepakKumar783815
 

Similar to Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi (20)

UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
 
LinuxOS-1 (1).ppt
LinuxOS-1 (1).pptLinuxOS-1 (1).ppt
LinuxOS-1 (1).ppt
 
UNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-IUNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-I
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
UNIX_module1.pptx
UNIX_module1.pptxUNIX_module1.pptx
UNIX_module1.pptx
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
Introduction to unix (1).pptx
Introduction to unix (1).pptxIntroduction to unix (1).pptx
Introduction to unix (1).pptx
 
Presentation1.pdf
Presentation1.pdfPresentation1.pdf
Presentation1.pdf
 
Spsl unit1
Spsl   unit1Spsl   unit1
Spsl unit1
 
UNIX_Module 1.pdf
UNIX_Module 1.pdfUNIX_Module 1.pdf
UNIX_Module 1.pdf
 
App A
App AApp A
App A
 
Architecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxArchitecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docx
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptx
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
 
Introduction to unix
Introduction to unixIntroduction to unix
Introduction to unix
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptx
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptx
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 
3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf
 

More from Sowmya Jyothi

Stacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURESStacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURES
Sowmya Jyothi
 
Functions in c mrs.sowmya jyothi
Functions in c mrs.sowmya jyothiFunctions in c mrs.sowmya jyothi
Functions in c mrs.sowmya jyothi
Sowmya Jyothi
 
Strings in c mrs.sowmya jyothi
Strings in c mrs.sowmya jyothiStrings in c mrs.sowmya jyothi
Strings in c mrs.sowmya jyothi
Sowmya Jyothi
 
Arrays in c unit iii chapter 1 mrs.sowmya jyothi
Arrays in c unit iii chapter 1 mrs.sowmya jyothiArrays in c unit iii chapter 1 mrs.sowmya jyothi
Arrays in c unit iii chapter 1 mrs.sowmya jyothi
Sowmya Jyothi
 
Bca data structures linked list mrs.sowmya jyothi
Bca data structures linked list mrs.sowmya jyothiBca data structures linked list mrs.sowmya jyothi
Bca data structures linked list mrs.sowmya jyothi
Sowmya Jyothi
 
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHIBCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
Sowmya Jyothi
 
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHIBCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
Sowmya Jyothi
 
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHIBCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
Sowmya Jyothi
 
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHIBCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
Sowmya Jyothi
 
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
Sowmya Jyothi
 
Unit II chapter 4 Loops in C
Unit II chapter 4 Loops in CUnit II chapter 4 Loops in C
Unit II chapter 4 Loops in C
Sowmya Jyothi
 
Unit ii chapter 2 Decision making and Branching in C
Unit ii chapter 2 Decision making and Branching in CUnit ii chapter 2 Decision making and Branching in C
Unit ii chapter 2 Decision making and Branching in C
Sowmya Jyothi
 
Unit ii chapter 1 operator and expressions in c
Unit ii chapter 1 operator and expressions in cUnit ii chapter 1 operator and expressions in c
Unit ii chapter 1 operator and expressions in c
Sowmya Jyothi
 
Overview of C Mrs Sowmya Jyothi
Overview of C Mrs Sowmya JyothiOverview of C Mrs Sowmya Jyothi
Overview of C Mrs Sowmya Jyothi
Sowmya Jyothi
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
Sowmya Jyothi
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
Sowmya Jyothi
 
Introduction to graphics
Introduction to graphicsIntroduction to graphics
Introduction to graphics
Sowmya Jyothi
 
Inter Process Communication PPT
Inter Process Communication PPTInter Process Communication PPT
Inter Process Communication PPT
Sowmya Jyothi
 
Internal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya JyothiInternal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya Jyothi
Sowmya Jyothi
 
Buffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiBuffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya Jyothi
Sowmya Jyothi
 

More from Sowmya Jyothi (20)

Stacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURESStacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURES
 
Functions in c mrs.sowmya jyothi
Functions in c mrs.sowmya jyothiFunctions in c mrs.sowmya jyothi
Functions in c mrs.sowmya jyothi
 
Strings in c mrs.sowmya jyothi
Strings in c mrs.sowmya jyothiStrings in c mrs.sowmya jyothi
Strings in c mrs.sowmya jyothi
 
Arrays in c unit iii chapter 1 mrs.sowmya jyothi
Arrays in c unit iii chapter 1 mrs.sowmya jyothiArrays in c unit iii chapter 1 mrs.sowmya jyothi
Arrays in c unit iii chapter 1 mrs.sowmya jyothi
 
Bca data structures linked list mrs.sowmya jyothi
Bca data structures linked list mrs.sowmya jyothiBca data structures linked list mrs.sowmya jyothi
Bca data structures linked list mrs.sowmya jyothi
 
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHIBCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
 
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHIBCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
 
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHIBCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
 
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHIBCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
 
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
 
Unit II chapter 4 Loops in C
Unit II chapter 4 Loops in CUnit II chapter 4 Loops in C
Unit II chapter 4 Loops in C
 
Unit ii chapter 2 Decision making and Branching in C
Unit ii chapter 2 Decision making and Branching in CUnit ii chapter 2 Decision making and Branching in C
Unit ii chapter 2 Decision making and Branching in C
 
Unit ii chapter 1 operator and expressions in c
Unit ii chapter 1 operator and expressions in cUnit ii chapter 1 operator and expressions in c
Unit ii chapter 1 operator and expressions in c
 
Overview of C Mrs Sowmya Jyothi
Overview of C Mrs Sowmya JyothiOverview of C Mrs Sowmya Jyothi
Overview of C Mrs Sowmya Jyothi
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
Introduction to graphics
Introduction to graphicsIntroduction to graphics
Introduction to graphics
 
Inter Process Communication PPT
Inter Process Communication PPTInter Process Communication PPT
Inter Process Communication PPT
 
Internal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya JyothiInternal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya Jyothi
 
Buffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiBuffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya Jyothi
 

Recently uploaded

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 

Recently uploaded (20)

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi

  • 1. Unix Operating System Overview Mrs.Sowmya Jyothi Faculty Mangalore
  • 2. Introduction  Unix is a multitasking, multiuser computer operating system developed in 1969 at AT&T(American Telephone & Telegraph Company) Bell Labs by Ken Thompson, Dennis Ritchie and others.  Several people can use a Unix computer at the same time; hence Unix is called a multiuser system. A user can also run multiple programs at the same time; hence Unix is a multitasking environment.  There are various Unix variants available in the market. Solaris Unix, AIX, HP Unix and BSD are a few examples. Linux is also a flavor of Unix which is freely available.
  • 3. Unix Introduction In the mid of 1965, a joint venture was undertaken by Bell laboratories, General Electric Company and Massachusetts Institute of Technology(MIT) to develop an operating system that could serve a large community of users and allowed them to share data. That OS was called as MULTICS(MULTiplexed Information of Computing Service). Some of the Bell Labs programmers who had worked on this project, Dennis Ritchie, Ken Thompson, Rudd Canaday, Joe Ossanna and Doug McIlroy designed and implemented the first multi-user operating system on PDP-7 computers. Brain W.Kernighan, who was connected with MULTICS, named this OS as UNIX(UNIplexed information of computing service).
  • 4. In 1971, this UNIX was ported to the PDP-11 computers. But this version was not easy to port on new machines, because all it’s coding were machine dependent. To resolve this problem, Ken Thompson created a new high-level language called “B” and rewritten the whole UNIX code in this high-level language. This language lacked in several features, so, Dennis Ritchie shifted the inadequateness of B and modified it to a new high-level language called “C”. Finally, the UNIX is written in this “C” language to stand tall on any machine.
  • 5. Features of the Unix System 1. The system is written in a high-level language, making it easy to read, understand, change and move to other machines. 2. It has a simple user interface that has the power to provide services that users want. 3. It provides primitives that permit complex programs to be built from simpler programs 4. It uses hierarchical file system that allows easy maintenance and efficient implementation 5. It uses a consistent format for files, making application programs easier to write. 6. It provides a simple, consistent interface to peripheral devices 7. It hides the machine architecture from the user, making it easier to write programs that run on different hardware implementations.
  • 6. Operating system Services:- 1.Controlling the execution of processes by allowing their creation, termination or suspension and communication. 2. Scheduling processes fairly for executing on the CPU. Processes share the CPU in a time-shared manner. The CPU executes a process, the kernel suspends it when its time quantum elapses, and the kernel schedules another process to execute. The kernel later reschedules the suspended process. 3. Allocating main memory for an executing process. If the system runs low on free memory, the kernel frees memory by writing a process temporarily to secondary memory, called a swap device. If the kernel writes entire processes to a swap device, the implementation of the UNIX system is called a swapping system; if it writes pages of memory to a swap device, it is called a paging system. 4. Allocating secondary memory for efficient storage and retrieval of user data. 5. Allowing processes controlled access to peripheral devices such as terminals, disk drives, tape drives and network devices.
  • 7. Unix System Structure-High Level architecture The UNIX operating system is made up of three parts; the kernel, the shell and the programs.
  • 8. The Unix system is viewed as a set of layers. Layer-1: Hardware – It consists of all hardware related information. Layer-2: Kernel, the OS is commonly called the System kernel, or Kernel. It interacts with hardware and performs most of the tasks like memory management, task scheduling, and management are done by the kernel. OS interacts directly with the hardware, providing common services to programs. Layer-3: Shell commands – Shell is the utility that processes users requests. When you type in a command at the terminal, the shell interprets the command and calls the program that you want. There are various commands like cp, mv, cat, grep, id, wc, nroff, a.out and more. Layer-4: Application Layer – It is the outermost layer that executes the given external applications.
  • 9. 1. The hardware at the center of the diagram provides the OS with basic services. 2. The OS interacts directly with the hardware, providing common services to programs. 3. Viewing the system as a set of layers, the OS is commonly called the System kernel, or Kernel. 4. Programs such as the shell and editors(ed and vi) shown in the outer layers interact with the kernel by invoking a well defined set of system calls. Shell is a software that lets users interact with the operating system, usually by typing at a command line. Shell acts like a command line interpreter. The system calls instruct the kernel to do various operations for the calling program and exchange data between the kernel and the program. 5. Other application programs can be built on top of lower-level programs, hence the existence of the outermost layer in the figure. For example, the standard C compiler, cc, is in the outermost layer in the figure.
  • 10. The Users Perspective The Unix File System:- The Unix file system is characterized by 1. A hierarchical structure 2. Consistent treatment of file data 3. The ability to create and delete files 4. Dynamic growth of files 5. Protection of file data 6. The treatment of peripheral devices as files
  • 11. The unix file system is organized as a tree with a single root node called root (written “/”), every non-leaf node of the file system structure is a directory of files, and files at the leaf nodes of the tree are either directories, regular files or special directory files. The name of the file is given by the path name that describes how to locate the file in the file system hierarchy. A path name is a sequence of component names separated by slash characters; a component is a sequence of characters that designates a file name that is uniquely contained in the previous (directory) component.
  • 12. A full pathname starts with a slash character and specifies a file that can be found by starting at the file system root and traversing the file tree, following the branches that lead to successive component names of the path name. Relative pathname - A path name does not have to start from root but can be designated relative to the current directory. Permission to access a file is controlled by access permissions associated with the file. Access permissions can be set independently to control read, write and execute permission for 3 classes of users: the file owner, a file group and others.
  • 14. Processing Environment:- Everything in UNIX is either a file or a process. A process is an executing program identified by a unique PID (process identifier). A file is a collection of data. They are created by users using text editors, running compilers etc. Examples of files: a document (report, essay etc.) The text of a program written in some high-level programming language a directory, containing information about its contents, which may be a mixture of other directories (subdirectories) and ordinary files. A program is an executable file, and a process is an instance of the program in execution. Many processes can execute simultaneously on UNIX systems with no logical limit to their number, and many instances of a program can exist simultaneously in the system. Various system calls allow processes to create new processes, terminate processes, synchronize stages of process creation and control reaction to various events.
  • 15. The system calls allow users to write programs that do sophisticated operations. The shell is a command line interpreter program that users typically execute after logging into the system. The shell allows 3 types of commands. First, a command can be an executable file that contains object code produced by compilation of source code. Second, a command can be an executable file that contains a sequence of shell command lines. Finally, a command can be an internal shell command.
  • 16. Assumptions about the hardware: The difference between the 2 modes are:- Processes in user mode can access their own instructions and data but not kernel instructions and data. Processes in kernel mode, however can access kernel and user addresses. Some machine instructions are privileged and results in an error when executed in user mode. Although the system executes in one of 2 modes, the kernel runs on behalf of a user process. The kernel is not a separate set of processes that run in parallel to user processes, but it is part of each user process.
  • 17. References: The design of the Unix operating system by Maurice J. Bach