1 / 28

Operating Systems

Operating Systems. Introduction to Operating System (OS). What is an Operating System (1)?. A modern computer consists of: One or more processors Main memory Disks Printers Various input/output devices.

phyre
Download Presentation

Operating Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Operating Systems Introduction to Operating System (OS)

  2. What is an Operating System (1)? • A modern computer consists of: • One or more processors • Main memory • Disks • Printers • Various input/output devices. • Managing all these varied components requires a layer of software – the Operating System (OS).

  3. What is an Operating System (2)? • An Operating System is a program that acts as an intermediary/interface between a user of a computer and the computer hardware. • OS goals: • Control/execute user/application programs. • Make the computer system convenient to use. • Ease the solving of user problems. • Use the computer hardware in an efficient manner. A. Frank - P. Weisberg

  4. Where does the OS fit in? A. Frank - P. Weisberg

  5. Services provided by an OS • Facilities for program creation • editors, compilers, linkers, debuggers, etc. • Program execution • loading in memory, I/O and file initialization. • Access to I/O and files • deals with the specifics of I/O and file formats. • System access • resolves conflicts for resource contention. • protection in access to resources and data. A. Frank - P. Weisberg

  6. Why are Operating Systems Important? • Important to understand and know how to correctly use when writing user applications. • Large and complex systems that have a high economic impact and result in interesting problems of management. • Few actually involved in OS design and implementation but nevertheless many general techniques to be learned and applied. • Combines concepts from many other areas of Computer Science: Architecture, Languages, Data Structures, Algorithms. A. Frank - P. Weisberg

  7. Computer Hardware Organization A. Frank - P. Weisberg

  8. Computer System Components • Hardware – provides basic computing resources (CPU, Memory, I/O devices, Communication). • Operating System – controls and coordinates the use of the hardware among various application programs for various users. • System & Application Programs – ways in which the system resources are used to solve computing problems of the users (Word processors, Compilers, Web browsers, Database systems, Video games). • Users – (People, Machines, other computers). A. Frank - P. Weisberg

  9. Hierarchical view of computer system A. Frank - P. Weisberg

  10. Static View of System Components A. Frank - P. Weisberg

  11. Dynamic View of System Components A. Frank - P. Weisberg

  12. End User Programmer Operating- System Designer Layers of a Computer System Application Programs Utilities Operating-System Computer Hardware A. Frank - P. Weisberg

  13. Views of an Operating System • There are three classical views (in literature): • Resource Manager – manages and allocates resources. • Control program – controls the execution of user programs and operations of I/O devices. • Command Executer – Provides an environment for running user commands. • But one more modern view: the Operating System as a Virtual Machine. A. Frank - P. Weisberg

  14. 1. Resource Manager • Resource Manager: • Manages and protects multiple computer resources: CPU, Processes, Internal/External memory, Tasks, Applications, Users, Communication channels, etc… • Handles and allocates resources to multiple users or multiple programs running at the same time and space (e.g., processor time, memory, I/O devices). • Decides between conflicting requests for efficient and fair resource use (e.g., maximize throughput, minimize response time). • Sort of a bottom-up view. A. Frank - P. Weisberg

  15. OS as a Resource Manager A. Frank - P. Weisberg

  16. 2. Control Program • Control Program: • Manages all the components of a complex computer system in an integrated manner. • Controls the execution of user programs and I/O devices to prevent errors and improper use of computer resources. • Looks over and protects the computer: Monitor, Supervisor, Executive, Controller, Master, Coordinator …. • Sort of a black box view. A. Frank - P. Weisberg

  17. 3. Command Executer • Command Executer: • Interfaces between the users and machine. • Supplies services/utilities to users. • Provides the users with a convenient CLI (Command Language Interface), also called a Shell (in UNIX), for entering the user commands. • Sort of a top-down view. A. Frank - P. Weisberg

  18. Modern view: Virtual Machine (1) • Operating System as a Virtual Machine: • An interface between the user and hardware that hides the details of the hardware (e.g., I/O). • Constructs higher-level (virtual) resources out of lower-level (physical) resources (e.g., files). • Definition: OS is a collection of software enhancements, executed on the bare hardware, culminating in a high-level virtual machine that serves as an advanced programming environment. • virtual machine = software enhancement = extended machine = abstract machine = layer = level = ring. A. Frank - P. Weisberg

  19. Modern view: Virtual Machine (2) A. Frank - P. Weisberg

  20. What is the OS/Kernel? • Is the Operating System just the Kernel (not the utilities and application programs)?! • The Command Line Interface (CLI) (or command layer/interpreteror shell) allows direct command entry by the user. • The shell used to be in the kernel but now is a utility outside of it: • Easy to change/debug • Many of them (sh, bsh, csh, ksh, tcsh, wsh, bash) • Possible to switch between them (chsh) A. Frank - P. Weisberg

  21. UNIX Shell and Utilities User Utilities Shell Kernel Hardware A. Frank - P. Weisberg

  22. Process Management • A process is a program in execution. It is a unit of work within the system. Program is a passive entity, process is an active entity. • Process needs resources to accomplish its task • CPU, memory, I/O, files • Initialization data • Process termination requires reclaim of any reusable resources • Single-threaded process has one program counter specifying location of next instruction to execute • Process executes instructions sequentially, one at a time, until completion • Multi-threaded process has one program counter per thread • Typically system has many processes, some user, some operating system running concurrently on one or more CPUs • Concurrency by multiplexing the CPUs among the processes / threads

  23. Process Management Activities The operating system is responsible for the following activities in connection with process management: • Creating and deleting both user and system processes • Suspending and resuming processes • Providing mechanisms for process synchronization • Providing mechanisms for process communication • Providing mechanisms for deadlock handling

  24. Memory Management • All data in memory before and after processing • All instructions in memory in order to execute • Memory management determines what is in memory when • Optimizing CPU utilization and computer response to users • Memory management activities • Keeping track of which parts of memory are currently being used and by whom • Deciding which processes (or parts thereof) and data to move into and out of memory • Allocating and deallocating memory space as needed

  25. Storage Management • OS provides uniform, logical view of information storage • Abstracts physical properties to logical storage unit - file • Each medium is controlled by device (i.e., disk drive, tape drive) • Varying properties include access speed, capacity, data-transfer rate, access method (sequential or random) • File-System management • Files usually organized into directories • Access control on most systems to determine who can access what • OS activities include • Creating and deleting files and directories • Primitives to manipulate files and dirs • Mapping files onto secondary storage • Backup files onto stable (non-volatile) storage media

  26. Mass-Storage Management • Usually disks used to store data that does not fit in main memory or data that must be kept for a “long” period of time. • Proper management is of central importance • Entire speed of computer operation hinges on disk subsystem and its algorithms • OS activities • Free-space management • Storage allocation • Disk scheduling • Some storage need not be fast • Tertiary storage includes optical storage, magnetic tape • Still must be managed • Varies between WORM (write-once, read-many-times) and RW (read-write)

  27. I/O Subsystem • One purpose of OS is to hide peculiarities of hardware devices from the user • I/O subsystem responsible for • Memory management of I/O including buffering (storing data temporarily while it is being transferred), caching (storing parts of data in faster storage for performance), spooling (the overlapping of output of one job with input of other jobs) • General device-driver interface • Drivers for specific hardware devices

  28. Protection and Security • Protection – any mechanism for controlling access of processes or users to resources defined by the OS • Security – defense of the system against internal and external attacks • Huge range, including denial-of-service, worms, viruses, identity theft, theft of service • Systems generally first distinguish among users, to determine who can do what • User identities (user IDs, security IDs) include name and associated number, one per user • User ID then associated with all files, processes of that user to determine access control • Group identifier (group ID) allows set of users to be defined and controls managed, then also associated with each process, file • Privilege escalation allows user to change to effective ID with more rights

More Related