OPERATING SYSTEMS UNIT - 1

Similar documents
Chapter 3: Operating-System Structures

OS and Computer Architecture. Chapter 3: Operating-System Structures. Common System Components. Process Management

Operating Systems Fundamentals. What is an Operating System? Focus. Computer System Components. Chapter 1: Introduction

Chapter 1: Introduction

Last class: OS and Architecture. OS and Computer Architecture

Last class: OS and Architecture. Chapter 3: Operating-System Structures. OS and Computer Architecture. Common System Components

Chapter 3: Operating-System Structures

Module 3: Operating-System Structures. Common System Components

Operating-System Structures

Module 3: Operating-System Structures

Chapter 3: Operating-System Structures

Module 1: Introduction

Operating System Review

Introduction. What is an Operating System? A Modern Computer System. Computer System Components. What is an Operating System?

Operating System: an Overview. Lucia Dwi Krisnawati, MA

ECE397A Operating Systems. Chapter 1: Introduction

Operating-System Structures

Module 1: Introduction

Operating Systems. studykorner.org

Module 1: Introduction. What is an Operating System?

Chapter 1: Introduction

Chapter 1: Introduction. What is an Operating System? Overview Course (contd.) How do I spend my time? Computer System Components

Instruction Cycle. Computer-System Architecture. Computer-System Operation. Common Functions of Interrupts. Chapter 2: Computer-System Structures

EECS 3221 Operating System Fundamentals

EECS 3221 Operating System Fundamentals

Chapter 1: Introduction

CS30002: Operating Systems. Arobinda Gupta Spring 2017

Overview of Operating Systems

To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization

Computer-System Architecture

Computer-System Architecture. Common Functions of Interrupts. Computer-System Operation. Interrupt Handling. Chapter 2: Computer-System Structures

European University of Lefke. Instructor: Dr. Arif SARI

Computer-System Structures

UNIT I OPERATING SYSTEMS OVERVIEW

Overview of Operating Systems

Lecture 1 Introduction (Chapter 1 of Textbook)

Chapter 1: Introduction. Operating System Concepts 8th Edition,

Introduction. TDDI04, K. Arvidsson, IDA, Linköpings universitet Contents. What is an Operating System (OS)?

CS6401- Operating System QUESTION BANK UNIT-I

CS370 Operating Systems

UNIT 2. OPERATING SYSTEM STRUCTURES

DM510 Operating Systems. Jacob Aae Mikkelsen

Operating Systems Course 2 nd semester 2016/2017 Chapter 1: Introduction

Module 2: Computer-System Structures. Computer-System Architecture

7/20/2008. What Operating Systems Do Computer-System Organization

Chapter 1: Introduction

Introduction to Operating Systems

Course Details. Operating Systems with C/C++ Course Details. What is an Operating System?

OPERATING SYSTEMS: Lesson 1: Introduction to Operating Systems

Operating- System Structures

CS420: Operating Systems

CS370 Operating Systems

Operating System Services

Operating Systems. Lecture Course in Autumn Term 2015 University of Birmingham. Eike Ritter. September 22, 2015

Chapter 1: Introduction

TDDI04, K. Arvidsson, IDA, Linköpings universitet Operating System Structures. Operating System Structures Overview. Operating System Services

CS420: Operating Systems

Introduction CHAPTER. Review Questions

Common Computer-System and OS Structures

Introduction. CS3026 Operating Systems Lecture 01

Ricardo Rocha. Department of Computer Science Faculty of Sciences University of Porto

Computer-System Architecture (cont.) Symmetrically Constructed Clusters (cont.) Advantages: 1. Greater computational power by running applications

Computer-System Organization (cont.)

Chapter 2: Operating-System Structures. Operating System Concepts 8 th Edition

Chapter 1: Introduction. Chapter 1: Introduction

Chapter 1: Introduction. Operating System Concepts 9 th Edit9on

Introduction to Computer Systems and Operating Systems

Course Content. 07-Feb-17 Faculty of Computer Science & Engineering 1 BK TP.HCM

2.5 Hardware Protection

CSE Opera+ng System Principles

Chapter 1: Introduction. Operating System Concepts 9 th Edit9on

Chapter 2: Operating-System Structures

Module 1 Introduction/OS Overview

Introduction CHAPTER. Practice Exercises. 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are:

Operating Systems Overview. Chapter 2

OPERATING SYSTEMS. Prescribed Text Book Operating System Principles, Seventh Edition By Abraham Silberschatz, Peter Baer Galvin and Greg Gagne

Topics: Early systems and OS overview Skim Chapters 1-2 of SGG Read Chapter 1 of USP CS 3733 Operating Systems

CSC 453 Operating Systems

Chapter 2: Operating-System Structures. Chapter 2: Operating-System Structures. Objectives. Operating System Services

Lecture 2 - Fundamental Concepts


Part I Overview Chapter 1: Introduction

Operating-System Structures

Operating Systems Overview. Chapter 2

Unit 2 : Computer and Operating System Structure

Module 1. Introduction:

CSC 453 Operating Systems

Operating System. Operating System Overview. Layers of Computer System. Operating System Objectives. Services Provided by the Operating System

Operating System Overview. Operating System

ROEVER ENGINEERING COLLEGE, PERAMBALUR DEPARTMENT OF INFORMATION TECHNOLOGY OPERATING SYSTEMS QUESTION BANK UNIT-I

Chapter 1: Introduction Dr. Ali Fanian. Operating System Concepts 9 th Edit9on

Four Components of a Computer System

OPERATING SYSTEMS Lecture Notes. Prepared by K.Rohini, Assistant Professor, CSE Department, GVPCEW.

Principles of Operating Systems CS 446/646

CHAPTER 1 - INTRODUCTION. Jacob Aae Mikk elsen

Chapter 2 Operating-System Structures

CHAPTER-1: INTRODUCTION TO OPERATING SYSTEM:

Objectives. Chapter 2: Operating-System Structures. 2.1 Operating System Services

ELEC 377 Operating Systems. Week 1 Class 2

The Lesson Plan of OS. The syllabus of OS. Access the lesson plan and syllabus at

Transcription:

OPERATING SYSTEMS UNIT - 1

Syllabus UNIT I FUNDAMENTALS Introduction: Mainframe systems Desktop Systems Multiprocessor Systems Distributed Systems Clustered Systems Real Time Systems Handheld Systems - Hardware Protection Operating-System Structures: Operating System Services - System Calls - System Programs System Structure - Virtual Machines.

Introduction

What is an Operating System? Definitions A program that acts as an intermediary between a user of a computer and the computer hardware and Use the computer hardware in an efficient manner. Resource allocator manages and allocates resources. Control program controls the execution of user programs and operations of I/O devices. Operating system goals: Execute user programs and make solving user problems easier. Make the computer system convenient to use.

Computer System Components 1. Hardware provides basic computing resources (CPU, memory, I/O devices). 2. Operating system controls and coordinates the use of the hardware among the various application programs for the various users. 3. Applications programs define the ways in which the system resources are used to solve the computing problems of the users (compilers, database systems, video games, business programs). 4. Users (people, machines, other computers).

Abstract View of System Components

Evolution of Operating Systems

Evolution of Operating Systems Mainframe Systems Desktop Systems Multiprocessor Systems Distributed Systems Clustered System Real -Time Systems Handheld Systems

First rudimentary operating system. Mainframe Systems

Memory Layout for a Simple Batch System

Multiprogrammed Batch Systems Several jobs are kept in main memory at the same time, and the CPU is multiplexed among them.

OS Features Needed for Multiprogramming I/O routine supplied by the system. Memory management the system must allocate the memory to several jobs. CPU scheduling the system must choose among several jobs ready to run. Allocation of devices.

Time-Sharing Systems Interactive Computing The CPU is multiplexed among several jobs that are kept in memory and on disk (the CPU is allocated to a job only if the job is in memory). A job swapped in and out of memory to the disk.

Desktop Systems Personal computers computer system dedicated to a single user. I/O devices keyboards, mice, display screens, small printers. User convenience and responsiveness. Can adopt technology developed for larger operating system often individuals have sole use of computer and do not need advanced CPU utilization of protection features. May run several different types of operating systems (Windows, MacOS, UNIX, Linux)

Multiprocessor/Parallel Systems Multiprocessor systems with more than on CPU in close communication. Tightly coupled system processors share memory and a clock; communication usually takes place through the shared memory. Advantages of parallel system: Increased throughput Economical Increased reliability graceful degradation Fault tolerant systems

Multiprocessor/Parallel Systems (Cont.) Symmetric multiprocessing (SMP) Each processor runs an identical copy of the operating system. Many processes can run at once without performance deterioration. Most modern operating systems support SMP Asymmetric multiprocessing Each processor is assigned a specific task; master processor schedules and allocated work to slave processors. More common in extremely large systems

Symmetric Multiprocessing Architecture

Distributed Systems Distribute the computation among several physical processors. Loosely coupled system each processor has its own local memory; processors communicate with one another through various communications lines, such as highspeed buses or telephone lines. Advantages of distributed systems. Resources Sharing Computation speed up load sharing Reliability Requires networking infrastructure. Local area networks (LAN) or Wide area networks (WAN) May be either client-server or peer-to-peer systems.

General Structure of Client-Server

Clustered Systems Clustering allows two or more systems to share storage. Provides high reliability. Asymmetric clustering: one server runs the application while other servers standby. Symmetric clustering: all N hosts are running the application.

Real-Time Systems Often used as a control device in a dedicated application such as controlling scientific experiments, medical imaging systems, industrial control systems, and some display systems. Well-defined fixed-time constraints. Real-Time systems may be either hard or soft real-time.

Handheld Systems Personal Digital Assistants (PDAs) Cellular telephones Issues: Limited memory Slow processors Small display screens.

Migration of Operating-System Concepts and Features

Hardware Protection

Hardware Protection Protection provided by hardware to OS against erroneous and priveledged instructions Erroneous (accessing illegal memory or issue illegal I/O instruction) programs can affect the OS Protection provided by hardware (like I/O devices, Memory devices and CPU) i.e. to detect the error and TRAP to the OS which in turn will abort the erroneous program Hardware Protection Mechanisms Dual-Mode Operation I/O Protection Memory Protection CPU Protection

Dual-Mode Operation Sharing system resources requires operating system to ensure that an incorrect program cannot cause other programs to execute incorrectly. Provide hardware support to differentiate between at least two modes of operations. 1. User mode execution done on behalf of a user. 2. Monitor mode (also kernel mode or system mode) execution done on behalf of operating system.

Dual-Mode Operation (Cont.) Mode bit added to computer hardware to indicate the current mode: monitor (0) or user (1). When an interrupt or fault occurs hardware switches to monitor mode. Privileged instructions / system calls can be issued only in monitor mode If system call is to be executed, the hardware sets the mode bit as 0. OS examines the vulnerability of the instruction and executes it. Interrupt/fault monitor user set user mode

I/O Protection All I/O instructions are privileged instructions. Must ensure that a user program could never gain control of the computer in monitor mode (I.e., a user program that, as part of its execution, stores a new address in the interrupt vector).

Use of A System Call to Perform I/O

Memory Protection Must provide memory protection at least for the interrupt vector and the interrupt service routines. In order to have memory protection, add two registers, to the process,that determine the range of legal addresses a program may access: Base register holds the smallest legal physical memory address. Limit register contains the size of the range Memory outside the defined range is protected.

Use of A Base and Limit Register

Memory Address Protection

Memory Protection When executing in monitor mode, the operating system has unrestricted access to both monitor and user s memory. The load instructions for the base and limit registers are privileged instructions.

CPU Protection Timer interrupts computer after specified period to ensure operating system maintains control. Timer is decremented every clock tick. When timer reaches the value 0, an interrupt occurs. Timer commonly used to implement time sharing. Time also used to compute the current time. Load-timer is a privileged instruction. Timer = counter + clock Timer: fixed or variable Fixed timer sets a counter to a constant time slice and clock ticks to 0 and interrupts Variable timer sets a counter to a time slice and clock ticks to 0 and interrupts.

OS Components

OS Components Process Management Main Memory Management File Management I/O System Management Secondary Management Networking Protection System Command-Interpreter System

Process Management A process is a program in execution. A process needs certain resources, including CPU time, memory, files, and I/O devices, to accomplish its task. The operating system is responsible for the following activities in connection with process management. Process creation and deletion. process suspension and resumption. Provision of mechanisms for: process synchronization process communication deadlock handling

Main-Memory Management Memory is a large array of words or bytes, each with its own address. It is a repository of quickly accessible data shared by the CPU and I/O devices. Main memory is a volatile storage device. It loses its contents in the case of system failure. The operating system is responsible for the following activities in connections with memory management: Keep track of which parts of memory are currently being used and by whom. Decide which processes to load when memory space becomes available. Allocate and deallocate memory space as needed.

File Management A file is a collection of related information defined by its creator. Commonly, files represent programs (both source and object forms) and data. The operating system is responsible for the following activities in connections with file management: File creation and deletion. Directory creation and deletion. Support of primitives for manipulating files and directories. Mapping files onto secondary storage. File backup on stable (nonvolatile) storage media.

I/O System Management The I/O system consists of: Buffering, caching systems A general device-driver interface Drivers for specific hardware devices

Secondary-Storage Management Since main memory (primary storage) is volatile and too small to accommodate all data and programs permanently, the computer system must provide secondary storage to back up main memory. Most modern computer systems use disks as the principle on-line storage medium, for both programs and data. The operating system is responsible for the following activities in connection with disk management: Free space management Storage allocation Disk scheduling

Networking (Distributed Systems) A distributed system is a collection processors that do not share memory or a clock. Each processor has its own local memory. The processors in the system are connected through a communication network. Communication takes place using a protocol. A distributed system provides user access to various system resources. Access to a shared resource allows: Computation speed-up Increased data availability Enhanced reliability

Protection System Protection refers to a mechanism for controlling access by programs, processes, or users to resources. The protection mechanism must: distinguish between authorized and unauthorized usage. specify the controls to be imposed. provide a means of enforcement.

Command-Interpreter System Many commands are given to the operating system by users through control statements. Command Interpreter is a program that reads next command/instruction and execute it.

OS Services

OS Services Program execution system capability to load a program into memory and to run it. I/O operations since user programs cannot execute I/O operations directly, the operating system must provide some means to perform I/O. File-system manipulation program capability to read, write, create, and delete files. Communications exchange of information between processes executing either on the same computer or on different systems tied together by a network. Implemented via shared memory or message passing. Error detection ensure correct computing by detecting errors in the CPU and memory hardware (memory error or power failure), in I/O devices (parity error, n/w failure, load paper in printer, etc..,), or in user programs (illegal memory access, CPU over-usage, etc..,).

Additional Operating System Functions Additional functions exist not for helping the user, but rather for ensuring efficient system operations. Resource allocation allocating resources to multiple users or multiple jobs running at the same time. Accounting keep track of and record which users use how much and what kinds of computer resources for account billing or for accumulating usage statistics. Protection ensuring that all access to system resources is controlled.

System Calls (system call is how a program requests a service from an OS)

System Calls System calls provide the interface between a program and the operating system. Example: file copy Three general methods are used to pass parameters between a running program and the operating system. Pass parameters in registers. Store the parameters in a table in memory, and the table address is passed as a parameter in a register. Push (store) the parameters onto the stack by the program, and pop off the stack by operating system.

Passing of Parameters As A Table

Types of System Calls Process control File management Device management Information maintenance Communications

Process control end, abort load, execute create process, terminate process get process attributes, set process attributes wait for time wait event, signal event allocate and free memory

File management create file, delete file open, close read, write, reposition get file attributes, set file attributes

Device management request device, release device read, write, reposition get device attributes, set device attributes logically attach or detach devices

Information maintenance get time or date, set time or date get system data, set system data get process, file, or device attributes set process, file, or device attributes

Communications create, delete communication connection send, receive messages transfer status information attach or detach remote devices

MS-DOS Execution At System Start-up Running a Program

UNIX Running Multiple Programs

Communication Models Communication may take place using either message passing or shared memory. Msg Passing Shared Memory

System Programs (Provides a convenient environment for program development and execution)

System Programs System programs provide a convenient environment for program development and execution. The can be divided into: File manipulation Status information File modification Programming language support Program loading and execution Communications Example: Command-Interpreter Command-Interpreter can implement commands by itself or use other system programs to implement commands. 2 nd approach drawbacks: slow

System Structure

MS-DOS System Structure MS-DOS written to provide the most functionality in the least space not divided into modules Although MS-DOS has some structure, its interfaces and levels of functionality are not well separated

MS-DOS Layer Structure

UNIX System Structure UNIX limited by hardware functionality, the original UNIX operating system had limited structuring. The UNIX OS consists of two separable parts. Systems programs The kernel Consists of everything below the system-call interface and above the physical hardware Provides the file system, CPU scheduling, memory management, and other operating-system functions; a large number of functions for one level.

UNIX System Structure

Layered Approach The operating system is divided into a number of layers (levels), each built on top of lower layers. The bottom layer (layer 0), is the hardware; the highest (layer N) is the user interface. With modularity, layers are selected such that each uses functions (operations) and services of only lower-level layers.

An Operating System Layer

OS/2 Layer Structure

Microkernel System Structure Moves as much from the kernel into user space. Communication takes place between user modules using message passing. Benefits: - easier to extend a microkernel - easier to port the operating system to new architectures - more reliable (less code is running in kernel mode) - more secure

Windows NT Client-Server Structure

Virtual Machines A virtual machine takes the layered approach to its logical conclusion. It treats hardware and the operating system kernel as though they were all hardware. A virtual machine provides an interface identical to the underlying bare hardware. The operating system creates the illusion of multiple processes, each executing on its own processor with its own (virtual) memory.

Virtual Machines (Cont.) The resources of the physical computer are shared to create the virtual machines. CPU scheduling can create the appearance that users have their own processor. Spooling and a file system can provide virtual card readers and virtual line printers. A normal user time-sharing terminal serves as the virtual machine operator s console.

System Models Non-virtual Machine Virtual Machine

Advantages/Disadvantages of Virtual Machines The virtual-machine concept provides complete protection of system resources since each virtual machine is isolated from all other virtual machines. This isolation, however, permits no direct sharing of resources. A virtual-machine system is a perfect vehicle for operating-systems research and development. System development is done on the virtual machine, instead of on a physical machine and so does not disrupt normal system operation. The virtual machine concept is difficult to implement due to the effort required to provide an exact duplicate to the underlying machine.

Java Virtual Machine Compiled Java programs are platform-neutral byte codes executed by a Java Virtual Machine (JVM). JVM consists of - class loader - class verifier - runtime interpreter

Java Virtual Machine