0% found this document useful (0 votes)
29 views

Chapter02 p1

The document discusses operating systems and their key functions and components. It covers the evolution of operating systems from early serial processing to modern time-sharing systems. The document also examines processes, memory management, and other core OS concepts.

Uploaded by

musabrown0329
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Chapter02 p1

The document discusses operating systems and their key functions and components. It covers the evolution of operating systems from early serial processing to modern time-sharing systems. The document also examines processes, memory management, and other core OS concepts.

Uploaded by

musabrown0329
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Operating

Systems:
Internals Chapter 2
and Design
Principles Operating System
Overview
BALOYI VR
Operating System
A program that controls the execution of
application programs
 An interface between applications and hardware
Main objectives of an OS:

• Convenience
• Efficiency
• Ability to evolve
 Program development
 Program execution
 Access I/O devices
 Controlled access to files
 System access
 Error detection and response
 Accounting
Key Interfaces

 Instruction
set architecture (ISA)
 Define machine

 Applicationbinary interface (ABI)


 Define standard

 Applicationprogramming interface (API)


 Give program
A computer is a set of resources for the
movement, storage, and processing of
data
 TheOS is responsible for managing
these resources
 Functionsin the same way as ordinary
computer software
 Program, or suite of programs, executed
by the processor
 Frequentlyrelinquishes control and must
depend on the processor to allow it to
regain control
Evolution of Operating
Systems
 A major OS will evolve over time for a
number of reasons:
Hardware upgrades

New types of hardware

New services

Fixes
Evolution of
Operating Systems
 Stages include:

Time
Sharing
Multiprogrammed Systems
Batch Systems
Simple Batch
Systems
Serial
Processing
Serial Processing
Earliest Computers: Problems:
 Scheduling:
 No operating system
 most installations used a
 programmers interacted
hardcopy sign-up sheet to
directly with the computer
reserve computer time
hardware
 time allocations could
 Computers ran from a console run short or long,
with display lights, toggle resulting in wasted
switches, some form of input computer time
device, and a printer
 Setup time
 Users have access to the
computer in “series”  a considerable amount of
time was spent just on setting
up the program to run
Simple Batch Systems

 Early computers were very expensive


 important to maximize processor utilization

 Monitor
 user no longer has direct access to processor
 job is submitted to computer operator who batches them
together and places them on an input device
 program branches back to the monitor when finished
 Monitor controls the sequence
of events
 Resident Monitor is software
always in memory
 Monitor reads in job and gives
control
 Job returns control to monitor
 Processor executes instruction from the memory
containing the monitor
 Executes the instructions in the user program until it
encounters an ending or error condition
 “control is passed to a job” means processor is fetching and
executing instructions in a user program
 “control is returned to the monitor” means that the processor
is fetching and executing instructions from the monitor
program
Job Control Language
(JCL)
Special type of programming
language used to provide
instructions to the monitor

what compiler to use

what data to use


Memory protection for monitor

• while the user program is executing, it must not alter the memory area
containing the monitor

Timer

• prevents a job from monopolizing the system

Privileged instructions

• can only be executed by the monitor

Interrupts

• gives OS more flexibility in controlling user programs


Modes of Operation

User Mode Kernel Mode


• user program executes in • monitor executes in kernel
user mode mode
• certain areas of memory are • privileged instructions may
protected from user access be executed
• certain instructions may not • protected areas of memory
be executed may be accessed
Simple Batch System
Overhead
 Processor time alternates between execution of user
programs and execution of the monitor
 Sacrifices:
 some main memory is now given over to the monitor
 some processor time is consumed by the monitor

 Despite overhead, the simple batch system improves


utilization of the computer
 Can be used to handle multiple interactive jobs
 Processor time is shared among multiple users
 Multiple users simultaneously access the
system through terminals, with the OS
interleaving the execution of each user
program in a short burst or quantum of
computation
 Operating
Systems are among the most
complex pieces of software ever developed
Major advances in
development include:
• Processes
• Memory management
• Information protection and
security
• Scheduling and resource
management
• System structure
 Fundamental to the structure of operating systems

A process can be defined as:

a program in execution
an instance of a running program

the entity that can be assigned to, and executed on, a processor

a unit of activity characterized by a single sequential thread of execution, a


current state, and an associated set of system resources
Development of the
Process
 Three major lines of computer system development
created problems in timing and synchronization that
contributed to the development:
multiprogramming batch operation
• processor is switched among the various programs residing in main
memory

time sharing
• be responsive to the individual user but be able to support many users
simultaneously

real-time transaction systems


• a number of users are entering queries or updates against a database
Causes of Errors
 Improper  Nondeterminate
synchronization program operation
 a program must wait until the  program execution is
data are available in a buffer interleaved by the processor
when memory is shared
 improper design of the
signaling mechanism can  the order in which programs
are scheduled may affect their
result in loss or duplication outcome

 Failed mutual exclusion  Deadlocks


 more than one user or  it is possible for two or more
program attempts to make programs to be hung up
use of a shared resource at waiting for each other
the same time
 may depend on the chance
 only one routine at at time
allowed to perform an timing of resource allocation
update against the file and release
 A process contains  The execution context is
three components: essential:
 an executable program  supervise and control the
process
 the associated data  process registers
needed by the program
 particular I/O event
the execution context
(or “process state”) of
the program
 The
OS has five principal storage
management responsibilities:

automatic
support of protection
process allocation long-term
modular and access
isolation and storage
programming control
management
A facility that allows programs to address
memory from a logical point of view, without
regard to the amount of main memory
physically available
 Conceived to meet the requirement of having
multiple user jobs reside in main memory
concurrently
 Allows processes to be comprised of a number of fixed-
size blocks, called pages
 Program references a word by means of a virtual address
 consists of a page number and an offset within the page
 each page may be located anywhere in main memory

 Provides for a dynamic mapping


Virtual
Memory
Virtual Memory
Addressing
 The nature of the
threat that concerns
an organization will Main
vary greatly issues availability
depending on the
circumstances
authenticity confidentiality
 The problem involves
controlling access to data
computer systems integrity
and the information
stored in them

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy