Operating System Review September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1.

Slides:



Advertisements
Similar presentations
Computer-System Structures Er.Harsimran Singh
Advertisements

Interactive lesson about operating system
WHAT IS AN OPERATING SYSTEM? An interface between users and hardware - an environment "architecture ” Allows convenient usage; hides the tedious stuff.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Chapter 2: Computer-System Structures
CMPT 300: Operating Systems I Dr. Mohamed Hefeeda
OS2-1 Chapter 2 Computer System Structures. OS2-2 Outlines Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection.
1 School of Computing Science Simon Fraser University CMPT 300: Operating Systems I Dr. Mohamed Hefeeda.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
1: Operating Systems Overview
OPERATING SYSTEM OVERVIEW
Abhinav Kamra Computer Science, Columbia University 2.1 Operating System Concepts Silberschatz, Galvin and Gagne  2002 Chapter 2: Computer-System Structures.
Chapter 1 and 2 Computer System and Operating System Overview
Modified from Silberschatz, Galvin and Gagne ©2009 CS 446/646 Principles of Operating Systems Lecture 1 Chapter 1: Introduction.
Computer System Structures memory memory controller disk controller disk controller printer controller printer controller tape-drive controller tape-drive.
Chapter 1 and 2 Computer System and Operating System Overview
Operating Systems CS208. What is Operating System? It is a program. It is the first piece of software to run after the system boots. It coordinates the.
Computer-System Structures
1.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts School of Computing Science Simon Fraser University CMPT 300: Operating Systems I Instructor:
A. Frank - P. Weisberg Operating Systems Functional View of Operating System.
1/21/2010CSCI 315 Operating Systems Design1 Computer System Structures Notice: The slides for this lecture have been largely based on those accompanying.
1/18/2008CSCI 315 Operating Systems Design1 Computer System Structures Notice: The slides for this lecture have been largely based on those accompanying.
Chapter 2: Computer-System Structures
What do operating systems do? manage processes manage memory and computer resources provide security features execute user programs make solving user.
General System Architecture and I/O.  I/O devices and the CPU can execute concurrently.  Each device controller is in charge of a particular device.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 1: Introduction.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Chapter 1: Introduction.
OPERATING SYSTEMS OVERVIEW. What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware.
LOGO OPERATING SYSTEM Dalia AL-Dabbagh
Chapter 1. Introduction What is an Operating System? Mainframe Systems
 What is an operating system? What is an operating system?  Where does the OS fit in? Where does the OS fit in?  Services provided by an OS Services.
2.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 2: Computer-System Structures Computer System Operation I/O Structure.
CHAPTER 2: COMPUTER-SYSTEM STRUCTURES Computer system operation Computer system operation I/O structure I/O structure Storage structure Storage structure.
Silberschatz, Galvin, and Gagne  Applied Operating System Concepts Module 2: Computer-System Structures Computer System Operation I/O Structure.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Chapter 2: Computer-System Structures
Thanks to Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2 Computer-System Structures n Computer System Operation n I/O Structure.
1 CSE Department MAITSandeep Tayal Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection.
2: Computer-System Structures
Recall: Three I/O Methods Synchronous: Wait for I/O operation to complete. Asynchronous: Post I/O request and switch to other work. DMA (Direct Memory.
Operating Systems and Networks AE4B33OSS Introduction.
1 Chapter 2: Computer-System Structures  Computer System Operation  I/O Structure  Storage Structure  Storage Hierarchy  Hardware Protection  General.
Chapter 1: Introduction. 1.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 1: Introduction What Operating Systems Do Computer-System.
Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection Network Structure.
Chapter 6-- Operating Systems Overview Chapter 6 OPERATING SYSTEMS OVERVIEW 1.
1: Operating Systems Overview 1 Jerry Breecher Fall, 2004 CLARK UNIVERSITY CS215 OPERATING SYSTEMS OVERVIEW.
CE Operating Systems Lecture 2 Low level hardware support for operating systems.
1 CS.217 Operating System By Ajarn..Sutapart Sappajak,METC,MSIT Chapter 2 Computer-System Structures Slide 1 Chapter 2 Computer-System Structures.
Silberschatz, Galvin and Gagne  2002 Modified for CSCI 399, Royden, Operating System Concepts Operating Systems Lecture 4 Computer Systems Review.
Silberschatz, Galvin and Gagne  Applied Operating System Concepts Chapter 2: Computer-System Structures Computer System Architecture and Operation.
CE Operating Systems Lecture 2 Low level hardware support for operating systems.
1 Lecture 1: Computer System Structures We go over the aspects of computer architecture relevant to OS design  overview  input and output (I/O) organization.
Review of Computer System Organization. Computer Startup For a computer to start running when it is first powered up, it needs to execute an initial program.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Chapter 2: Computer-System Structures(Hardware) or Architecture or Organization Computer System Operation I/O Structure Storage Structure Storage Hierarchy.
OPERATING SYSTEMS STRUCTURES Jerry Breecher 2: Operating System Structures 1.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Chapter 2: Computer-System Structures(Hardware)
Applied Operating System Concepts
Chapter 2: Computer-System Structures
Chapter 1: Introduction
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Computer-System Architecture
Module 2: Computer-System Structures
Module 2: Computer-System Structures
Chapter 2: Computer-System Structures
Chapter 2: Computer-System Structures
Module 2: Computer-System Structures
Module 2: Computer-System Structures
Presentation transcript:

Operating System Review September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1

WHAT IS AN OPERATING SYSTEM? An interface between users and hardware - an environment "architecture” Allows convenient usage; hides the tedious stuff Allows efficient usage; parallel activity, avoids wasted cycles Provides information protection Gives each user a slice of the resources Acts as a control program. September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-2

The Layers Of A System September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-3 Program Interface Humans User Programs O.S. Interface O.S. Hardware Interface/ Privileged Instructions Disk/Memory/Screen

Components A mechanism for scheduling threads or processes. Scheduling can be as simple as running the next thread, or it can use relatively complex rules to pick a running process. A method for simultaneous CPU execution and IO handling. Processing is going on even as IO (such as disk) is occurring in preparation for future CPU work. Off Line Processing; not only are IO and CPU happening concurrently, but some off-board intelligent processing is occurring with the IO. September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-4

Components (Cont.) The CPU is wasted if a thread waits for I/O. This leads to: Multithreading ( dynamic switching ). While one thread waits for a resource, the CPU can find another thread to run. It means that several threads are ready to run and only need the CPU resource in order to continue. All of this leads to: –memory management – resource scheduling – deadlock protection which are the subject of the rest of this course. September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-5

Characteristics Concurrent Processing - Tightly coupled systems that communicate via shared memory. Used for scientific applications. Used for speed improvement by putting together a number of off-the-shelf processors. Distributed Systems - Loosely coupled systems that communicate via message passing. Advantages include resource sharing, speed up, reliability, communication. Real Time Systems - Rapid response time is main characteristic. Used in control of applications where rapid response to a stimulus is essential. September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-6

Characteristics Interrupts Interrupt transfers control to the interrupt service routine generally, through the interrupt vector, which contains the addresses of all the service routines. Interrupt architecture must save the address of the interrupted instruction. Incoming interrupts are disabled while another interrupt is being processed to prevent a lost interrupt. A trap is a software-generated interrupt caused either by an error or a user request. An operating system is interrupt driven. September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-7

Hardware Support September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-8 These are the devices that make up a typical system. Any of these devices can cause an electrical interrupt that grabs the attention of the CPU.

Hardware Support September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-9 Sequence of events for processing an IO request. Comparing Synchronous and Asynchronous IO Operations

Hardware Support (Cont.) September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-10 This is O.S. Bookkeeping. These structures are necessary to keep track of IO in progress.

Memory (Storage) Hierarchy Very fast storage is very expensive. So the Operating System manages a hierarchy of storage devices in order to make the best use of resources. In fact, considerable effort goes into this support. September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-11 Fast and Expensive Slow an Cheap

Memory Hierarchy Performance September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-12

Cache Handling Important principle, performed at many levels in a computer (in hardware, operating system, software) Information in use copied from slower to faster storage temporarily Faster storage (cache) checked first to determine if information is there –If it is, information used directly from the cache (fast) –If not, data copied to cache and used there Cache smaller than storage being cached –Cache management important design problem –Cache size and replacement policy September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-13

Protection The goal is protecting the Operating System and others from malicious or ignorant users. The User/Supervisor Mode and privileged instructions. Concurrent threads might interfere with others. This leads to protection of resources by user/supervisor mode. These resources include: I/O Define I/O instructions as privileged; they can be executed only in Supervisor mode. System calls get us from user to supervisor mode. September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-14

Protection (Cont.) Memory –A user process can only access its own logical memory. For instance, it can't modify supervisor code. Depends on an address translation scheme such as that shown here. September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-15

Protection (Cont.) CPU –A clock prevents threads from using all the CPU time. This clock causes an interrupt that causes the operating system to gain control from a user thread. For machines connected together, this protection must extend across: –Shared resources, –Multiprocessor Architectures, –Clustered Systems The practice of this is called “distributed operating systems”. September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-16