UNIT – 1 INTRODUCTION AND OVERVIEW OF OPERATING SYSTEMS ECEA.

Slides:



Advertisements
Similar presentations
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Advertisements

Operating System Structures
COURSE: COMPUTER PLATFORMS
Chap 2 System Structures.
CS 345 Computer System Overview
CMPT 300: Operating Systems I Dr. Mohamed Hefeeda
©Brooks/Cole, 2003 Chapter 7 Operating Systems Dr. Barnawi.
1 Operating Systems Ch An Overview. Architecture of Computer Hardware and Systems Software Irv Englander, John Wiley, Bare Bones Computer.
Chapter 3 Overview of Operating Systems Copyright © 2008.
OS and the Computer System  Some OS programs exist permanently in the system area of the memory to monitor and control activities in the computer system.
Chapter 1: IntroductionDhamdhere: Operating Systems— A Concept-Based Approach Slide No: 1 Copyright ©2005 Overview of Operating Systems Chapters 1 and.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3 Operating System Organization.
Chapter 2 The OS, the Computer, and User Programs Copyright © 2008.
Basics of Operating Systems March 4, 2001 Adapted from Operating Systems Lecture Notes, Copyright 1997 Martin C. Rinard.
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Chapter 3 Process Description and Control Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee Community College,
Chapter 1: IntroductionDhamdhere: Operating Systems— A Concept-Based Approach, 2 ed Slide No: 1 Copyright © 2008 Introduction Chapter 1.
Chapter 3 Process Description and Control Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee Community College,
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
©Brooks/Cole, 2003 Chapter 7 Operating Systems. ©Brooks/Cole, 2003 Define the purpose and functions of an operating system. Understand the components.
OS provide a user-friendly environment and manage resources of the computer system. Operating systems manage: –Processes –Memory –Storage –I/O subsystem.
Most modern operating systems incorporate these five components.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
◦ What is an Operating System? What is an Operating System? ◦ Operating System Objectives Operating System Objectives ◦ Services Provided by the Operating.
Invitation to Computer Science 5 th Edition Chapter 6 An Introduction to System Software and Virtual Machine s.
INVITATION TO COMPUTER SCIENCE, JAVA VERSION, THIRD EDITION Chapter 6: An Introduction to System Software and Virtual Machines.
E X C E E D I N G E X P E C T A T I O N S OP SYS Linux System Administration Dr. Hoganson Kennesaw State University Operating Systems Functions of an operating.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
OPERATING SYSTEMS Lecture 3: we will explore the role of the operating system in a computer Networks and Communication Department 1.
Systems II San Pham CS /20/03. Topics Operating Systems Resource Management – Process Management – CPU Scheduling – Deadlock Protection/Security.
G53SEC 1 Reference Monitors Enforcement of Access Control.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Processes Introduction to Operating Systems: Module 3.
INFORMATION SYSTEM-SOFTWARE Topic: OPERATING SYSTEM CONCEPTS.
By Teacher Asma Aleisa Year 1433 H.   Goals of memory management  To provide a convenient abstraction for programming.  To allocate scarce memory.
CS 346 – Chapter 2 OS services –OS user interface –System calls –System programs How to make an OS –Implementation –Structure –Virtual machines Commitment.
Operating System Principles And Multitasking
Operating System Structure A key concept of operating systems is multiprogramming. –Goal of multiprogramming is to efficiently utilize all of the computing.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Chapter 2 Introduction to OS Chien-Chung Shen CIS/UD
Introduction to Operating System. 1.1 What is Operating System? An operating system is a program that manages the computer hardware. It also provides.
CSCI/CMPE 4334 Operating Systems Review: Exam 1 1.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Functions of Operating Systems V1.0 (22/10/2005).
Introduction to Operating Systems Concepts
Module 3: Operating-System Structures
Lecture 1-Part 2: Operating-System Structures
Applied Operating System Concepts
Chapter 2 Memory and process management
Operating System Structure
Introduction to Operating System (OS)
Firewalls.
OPERATING SYSTEM OVERVIEW
Shell & Kernel Concepts in Operating System
Chapter 1: Intro (excerpt)
Operating Systems.
Security.
Operating Systems.
Unit 1: Introduction to Operating System
Basic Concepts Protection: Security:
Functions of an operating system
Lecture 1-Part 2: Operating-System Structures
Chapter 2: Operating-System Structures
Operating Systems Lecture 3.
Operating Systems : Overview
Operating Systems: A Modern Perspective, Chapter 3
Operating Systems : Overview
Chapter 2: Operating-System Structures
Presentation transcript:

UNIT – 1 INTRODUCTION AND OVERVIEW OF OPERATING SYSTEMS ECEA

 What is an OS? ◦ Abstract views  To a college student: SW that permits access to the Internet  To a programmer: SW that makes it possible to develop programs on a computer system  To a user of an application package: SW that makes it possible to use the package  To a technician in a computerized chemical plant: invisible component of a computer system that controls the plant ◦ An abstract view focuses only on essential characteristics ECEA

 Operating system designer also has an abstract view ECEA OS is a collection of routines that facilitates execution of user programs and use of resources

 We use abstract views to present design of OS components. It has two benefits: ◦ Managing complexity  Abstract view contains only selected features of a system ◦ Presenting a generic view  For example, user interface has many variants in practice  Command line interface  Graphical user interface (GUI) ECEA

 Logical and physical organization ECEA

 Fundamental goals of an operating system 1)Efficient use of computer resources 2)User convenience 3)Noninterference in the activities of its users  When these goals conflict, designer makes a trade-off for ◦ Efficient use ◦ User convenience  Notion of effective utilization ◦ Each OS provides a different flavor of effectiveness ECEA

 OS ensures efficient use of memory, CPU, and I/O devices ◦ Poor efficiency can result if a program does not use a resource allocated to it  OS itself consumes CPU and memory resources, which constitutes overhead ◦ It reduces resources for user programs  OS can monitor use of resources to ensure efficiency ◦ It would increase the overhead  OS uses policies that ensure efficiency ECEA

 User can face interference in computational activities ◦ Program execution or operation of OS can be disrupted by actions of other persons  OS prevents interference by allocating resources for exclusive use of programs and OS services, and preventing illegal accesses to resources ◦ Illegal file access  OS knows which user files can be accessed by whom  Achieved through authorization ECEA

 Principal functions of OS: ◦ Program management ◦ Resource management ◦ Security and protection ECEA ConcernOS responsibility Programs Initiation and termination of programs. Providing convenient methods so that several programs can work towards a common goal. Resources Ensuring availability of resources in the system and allocating them to programs. Scheduling Deciding when and for how long, to devote the CPU to a program. ProtectionProtect data and programs against interference from other users and their programs.

ECEA

 OS can interleave execution of programs on a fast CPU ◦ Scheduling decides which program should be given the CPU at any time  Policy influences efficient CPU use and user service  Preemption: Taking away the CPU from a program ECEA

 Resource allocations and deallocations can be done with a resource table ◦ Entry: name, address and status of a resource unit ◦ Constructed by the boot procedure, maintained during operation ECEA

 Popular resource allocation strategies: ◦ Resource partitioning  OS decides a priori what resources to allocate to each user program; divides system resources into partitions  A resource partition is a collection of resources  Resource table contains entries for partitions  Simple to implement, but lacks flexibility ◦ Pool-based  OS allocates resources from a pool of resources  Consults table and allocates the resource if it is free  Less overhead of allocating and deallocating resources  Achieves more efficient use of resources ECEA

 A virtual resource is a fictitious resource ◦ Abstract view of a resource taken by a program ◦ Supported by OS through use of a real resource ◦ Same real resource may support several virtual ones ◦ Started with the use of virtual devices  E.g., a print server  Provides effect of having more resources  Most OSs provide virtual memory ◦ May execute a program bigger than size of RAM  Some OSs create virtual machines ◦ Each virtual machine can be allocated to a user ECEA

 Security counters threats of interference or illegal use posed by persons/programs outside OS control ◦ Authentication: only registered user can use a computer system  Protection counters threats posed by users of an OS ◦ Memory protection is a HW feature used by OS to thwart disruption of programs and OS services ◦ Authorization thwarts interference with files ECEA

 Intruders are outsiders who can cause interference ◦ May use or create malicious programs  Trojan horses  Viruses  Worms  Methods of addressing security threats ◦ Authentication techniques ◦ Plugging security holes ◦ Internet firewalls ECEA