SlideShare una empresa de Scribd logo
1 de 39
Operating Systems:
 Internals and Design Principles, 6/E
           William Stallings


        Chapter 2
Operating System Overview




                     Patricia Roy
           Manatee Community College, Venice,
                          FL
                  ©2008, Prentice Hall
Operating System
• A program that controls the execution of
  application programs
• An interface between applications and
  hardware
Operating System Objectives
• Convenience: make the computer more
  convenient to use
• Efficiency: in using the system resources
• Ability to evolve: to permit the effective
  development, testing, and introduction of
  new system functions.
Layers and Views
Services Provided by the OS
• Program development
    – Editors and debuggers
•   Program execution
•   Access I/O devices
•   Controlled access to files
•   System access
Services Provided by the OS
• Error detection and response
  – Internal and external hardware errors
  – Software errors
  – OS provide a response that clears the error
    (ending the program that cause error, retry the
    operation, or simply reporting the error to the
    application).
Services Provided by the OS
• Accounting
  – Collect usage statistics
  – Monitor performance
  – Used to anticipate future enhancements
  – Used for billing purposes
Operating System
• Responsible for managing resources
• Functions same way as ordinary computer
  software
  – It is a program that is executed
• Operating system relinquishes control of
  the processor
OS as Resource Manager
Kernel
• Portion of operating system that is in main
  memory
• Contains most frequently used functions
• Also called the nucleus
Evolution of Operating
                Systems
• Serial processing
  – No operating system
  – Programs in machine code loaded from input
    device
  – If an error halted the program, the error
    condition was indicated by lights.
  – The output appears on the printer
Evolution of Operating
                Systems
• Serial processing, two main problems:
  – Schedule time: waste of time for short
    programs. Problem if not finish in the
    allocated time
  – Setup time: included loading the compiler,
    source program, saving compiled program,
    and loading and linking
Evolution of Operating
                Systems
• Simple batch system: the first OS (batch
  OS) on IBM 701 by general Motors
  – Monitor
    • Software that controls the sequence of events
    • Batch jobs together
    • Program returns control to monitor when finished,
      then the monitor automatically begin loading the
      next program.
Desirable Hardware Features
• Memory protection
  – Does not allow the memory area containing
    the monitor to be altered
• Timer
  – Prevents a job from monopolizing the system
  – If the timer expires the user program stopped.
Desirable Hardware Features
• Privileged instructions
  – Certain machine level instructions can only be
    executed by the monitor such as I/O instr.
• Interrupts
  – Early computer models did not have this
    capability. This feature gives the OS the
    flexibility in relinquishing control and regaining
    control to and regaining control from user
    programs.
Memory Protection
• User program executes in user mode
  – Certain instructions may not be executed
  – Certain area’s of memory are protected from
    user’s use.
Memory Protection
• Monitor executes in system mode(Kernel
  mode)
  – Privileged instructions are executed
  – Protected areas of memory may be accessed
System Utilization Example
Uniprogramming
• Processor must wait for I/O instruction to
  complete before proceeding
Multiprogramming
• When one job needs to wait for I/O, the
  processor can switch to the other job
Multiprogramming
Utilization Histograms
Example
Time Sharing Systems
• Using multiprogramming to handle multiple
  interactive jobs
• Processor’s time is shared among multiple
  users
• Multiple users simultaneously access the
  system through terminals, with the OS
  interleaving the execution of each user
  program in a short burst or quantum of
  computation.
Major Achievements
There have been five major theoretical advances
in the development of operating systems:
•   Processes
•   Memory management
•   Information protection and security
•   Scheduling and resource management
•   System structure
Process
• A program in execution
• An instance of a program running on a
  computer
• The entity that can be assigned to and
  executed on a processor
Process
• Consists of three components
  – An executable program
  – Associated data needed by the program
  – Execution context of the program
    • All information the operating system needs to
      manage the process
Process
Memory Management
The os has five principle storage management
responsibilities:
•   Process isolation
•   Automatic allocation and management
•   Support of modular programming
•   Protection and access control
•   Long-term storage
Information Protection and
             Security
Work in security and protection can be
  grouped into four categories:
• Availability
  – Concerned with protecting the system against
    interruption
• Confidentiality
  – Assuring that users cannot read data for
    which access is unauthorized
Information Protection and
             Security
• Data integrity
  – Protection of data from unauthorized
    modification
• Authenticity
  – Concerned with the proper verification of the
    identity of users and the validity of messages
    or data
Scheduling and Resource
          Management
Any resource allocation and scheduling policy must
  consider three factors:
• Fairness
  – Give equal and fair access to resources
• Differential responsiveness
  – Discriminate among different classes of jobs
• Efficiency
  – Maximize throughput, minimize response time,
    and accommodate as many uses as possible
System Structure
• View the system as a series of levels
• Each level performs a related subset of
  functions
• Each level relies on the next lower level to
  perform more primitive functions
• This decomposes a problem into a number
  of more manageable subproblems
Levels
• Level 1
  – Electronic circuits
  – Objects are registers, memory cells, and logic
    gates
  – Operations are clearing a register or reading a
    memory location
• Level 2
  – Processor’s instruction set
  – Operations such as add, subtract, load, and
    store
Levels
• Level 3
  – Adds the concept of a procedure or
    subroutine, plus call/return operations
• Level 4
  – Interrupts
Concepts Related to
         Multiprogramming
• Level 5
  – Process as a program in execution
  – Suspend and resume processes
• Level 6
  – Secondary storage devices
  – Transfer of blocks of data
ConceptsRelated to
         Multiprogramming
• Level 7
  – Creates logical address space for processes
  – Organizes virtual address space into blocks
Deal with External Objects
• Level 8
  – Communication of information and messages
    between processes
• Level 9
  – Supports long-term storage of named files
• Level 10
  – Provides access to external devices using
    standardized interfaces
Deal with External Objects
• Level 11
  – Responsible for maintaining the association
    between the external and internal identifiers
• Level 12
  – Provides full-featured facility for the support of
    processes
• Level 13
  – Provides an interface to the OS for the user

Más contenido relacionado

La actualidad más candente

resource management
  resource management  resource management
resource management
Ashish Kumar
 
Process Synchronization And Deadlocks
Process Synchronization And DeadlocksProcess Synchronization And Deadlocks
Process Synchronization And Deadlocks
tech2click
 

La actualidad más candente (20)

Lecture 2 process
Lecture 2   processLecture 2   process
Lecture 2 process
 
Deadlock Avoidance - OS
Deadlock Avoidance - OSDeadlock Avoidance - OS
Deadlock Avoidance - OS
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 
Chapter 7 - Deadlocks
Chapter 7 - DeadlocksChapter 7 - Deadlocks
Chapter 7 - Deadlocks
 
8 memory management strategies
8 memory management strategies8 memory management strategies
8 memory management strategies
 
Processes description and process control.
Processes description and process control.Processes description and process control.
Processes description and process control.
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 
Os Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual MemoryOs Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual Memory
 
Peterson Critical Section Problem Solution
Peterson Critical Section Problem SolutionPeterson Critical Section Problem Solution
Peterson Critical Section Problem Solution
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
MULTILEVEL QUEUE SCHEDULING
MULTILEVEL QUEUE SCHEDULINGMULTILEVEL QUEUE SCHEDULING
MULTILEVEL QUEUE SCHEDULING
 
Mutual exclusion and sync
Mutual exclusion and syncMutual exclusion and sync
Mutual exclusion and sync
 
CPU Scheduling Algorithms
CPU Scheduling AlgorithmsCPU Scheduling Algorithms
CPU Scheduling Algorithms
 
Os unit 3 , process management
Os unit 3 , process managementOs unit 3 , process management
Os unit 3 , process management
 
OS Unit 5 - Memory Management
OS Unit 5 - Memory ManagementOS Unit 5 - Memory Management
OS Unit 5 - Memory Management
 
Distributed operating system(os)
Distributed operating system(os)Distributed operating system(os)
Distributed operating system(os)
 
resource management
  resource management  resource management
resource management
 
Process Synchronization And Deadlocks
Process Synchronization And DeadlocksProcess Synchronization And Deadlocks
Process Synchronization And Deadlocks
 
scheduling
schedulingscheduling
scheduling
 

Similar a Lec # 1 chapter 2

operating-system-03092013175227-operating-system.ppt
operating-system-03092013175227-operating-system.pptoperating-system-03092013175227-operating-system.ppt
operating-system-03092013175227-operating-system.ppt
TiktokIndia2
 

Similar a Lec # 1 chapter 2 (20)

Chapter02-rev.pptx
Chapter02-rev.pptxChapter02-rev.pptx
Chapter02-rev.pptx
 
cs-intro-os.ppt
cs-intro-os.pptcs-intro-os.ppt
cs-intro-os.ppt
 
Chapter02
Chapter02Chapter02
Chapter02
 
Chapter02
Chapter02Chapter02
Chapter02
 
operating-system-03092013175227-operating-system.ppt
operating-system-03092013175227-operating-system.pptoperating-system-03092013175227-operating-system.ppt
operating-system-03092013175227-operating-system.ppt
 
Operating systems introduction
Operating systems   introductionOperating systems   introduction
Operating systems introduction
 
SISTEMAS OPERATIVOS.pptx
SISTEMAS OPERATIVOS.pptxSISTEMAS OPERATIVOS.pptx
SISTEMAS OPERATIVOS.pptx
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
 
list of all Functions of operating system.pptx
list of all Functions of operating system.pptxlist of all Functions of operating system.pptx
list of all Functions of operating system.pptx
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
 
Os1
Os1Os1
Os1
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
Operating system Chapter One
Operating system Chapter OneOperating system Chapter One
Operating system Chapter One
 
Os unit i
Os unit iOs unit i
Os unit i
 
Operating System-adi.pdf
Operating System-adi.pdfOperating System-adi.pdf
Operating System-adi.pdf
 
Os concepts
Os conceptsOs concepts
Os concepts
 
Engg-0505-IT-Operating-Systems-2nd-year.pdf
Engg-0505-IT-Operating-Systems-2nd-year.pdfEngg-0505-IT-Operating-Systems-2nd-year.pdf
Engg-0505-IT-Operating-Systems-2nd-year.pdf
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Lec # 1 chapter 2

  • 1. Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall
  • 2. Operating System • A program that controls the execution of application programs • An interface between applications and hardware
  • 3. Operating System Objectives • Convenience: make the computer more convenient to use • Efficiency: in using the system resources • Ability to evolve: to permit the effective development, testing, and introduction of new system functions.
  • 5. Services Provided by the OS • Program development – Editors and debuggers • Program execution • Access I/O devices • Controlled access to files • System access
  • 6. Services Provided by the OS • Error detection and response – Internal and external hardware errors – Software errors – OS provide a response that clears the error (ending the program that cause error, retry the operation, or simply reporting the error to the application).
  • 7. Services Provided by the OS • Accounting – Collect usage statistics – Monitor performance – Used to anticipate future enhancements – Used for billing purposes
  • 8. Operating System • Responsible for managing resources • Functions same way as ordinary computer software – It is a program that is executed • Operating system relinquishes control of the processor
  • 9. OS as Resource Manager
  • 10. Kernel • Portion of operating system that is in main memory • Contains most frequently used functions • Also called the nucleus
  • 11. Evolution of Operating Systems • Serial processing – No operating system – Programs in machine code loaded from input device – If an error halted the program, the error condition was indicated by lights. – The output appears on the printer
  • 12. Evolution of Operating Systems • Serial processing, two main problems: – Schedule time: waste of time for short programs. Problem if not finish in the allocated time – Setup time: included loading the compiler, source program, saving compiled program, and loading and linking
  • 13. Evolution of Operating Systems • Simple batch system: the first OS (batch OS) on IBM 701 by general Motors – Monitor • Software that controls the sequence of events • Batch jobs together • Program returns control to monitor when finished, then the monitor automatically begin loading the next program.
  • 14. Desirable Hardware Features • Memory protection – Does not allow the memory area containing the monitor to be altered • Timer – Prevents a job from monopolizing the system – If the timer expires the user program stopped.
  • 15. Desirable Hardware Features • Privileged instructions – Certain machine level instructions can only be executed by the monitor such as I/O instr. • Interrupts – Early computer models did not have this capability. This feature gives the OS the flexibility in relinquishing control and regaining control to and regaining control from user programs.
  • 16. Memory Protection • User program executes in user mode – Certain instructions may not be executed – Certain area’s of memory are protected from user’s use.
  • 17. Memory Protection • Monitor executes in system mode(Kernel mode) – Privileged instructions are executed – Protected areas of memory may be accessed
  • 19. Uniprogramming • Processor must wait for I/O instruction to complete before proceeding
  • 20. Multiprogramming • When one job needs to wait for I/O, the processor can switch to the other job
  • 24. Time Sharing Systems • Using multiprogramming to handle multiple interactive jobs • Processor’s time is shared among multiple users • Multiple users simultaneously access the system through terminals, with the OS interleaving the execution of each user program in a short burst or quantum of computation.
  • 25. Major Achievements There have been five major theoretical advances in the development of operating systems: • Processes • Memory management • Information protection and security • Scheduling and resource management • System structure
  • 26. Process • A program in execution • An instance of a program running on a computer • The entity that can be assigned to and executed on a processor
  • 27. Process • Consists of three components – An executable program – Associated data needed by the program – Execution context of the program • All information the operating system needs to manage the process
  • 29. Memory Management The os has five principle storage management responsibilities: • Process isolation • Automatic allocation and management • Support of modular programming • Protection and access control • Long-term storage
  • 30. Information Protection and Security Work in security and protection can be grouped into four categories: • Availability – Concerned with protecting the system against interruption • Confidentiality – Assuring that users cannot read data for which access is unauthorized
  • 31. Information Protection and Security • Data integrity – Protection of data from unauthorized modification • Authenticity – Concerned with the proper verification of the identity of users and the validity of messages or data
  • 32. Scheduling and Resource Management Any resource allocation and scheduling policy must consider three factors: • Fairness – Give equal and fair access to resources • Differential responsiveness – Discriminate among different classes of jobs • Efficiency – Maximize throughput, minimize response time, and accommodate as many uses as possible
  • 33. System Structure • View the system as a series of levels • Each level performs a related subset of functions • Each level relies on the next lower level to perform more primitive functions • This decomposes a problem into a number of more manageable subproblems
  • 34. Levels • Level 1 – Electronic circuits – Objects are registers, memory cells, and logic gates – Operations are clearing a register or reading a memory location • Level 2 – Processor’s instruction set – Operations such as add, subtract, load, and store
  • 35. Levels • Level 3 – Adds the concept of a procedure or subroutine, plus call/return operations • Level 4 – Interrupts
  • 36. Concepts Related to Multiprogramming • Level 5 – Process as a program in execution – Suspend and resume processes • Level 6 – Secondary storage devices – Transfer of blocks of data
  • 37. ConceptsRelated to Multiprogramming • Level 7 – Creates logical address space for processes – Organizes virtual address space into blocks
  • 38. Deal with External Objects • Level 8 – Communication of information and messages between processes • Level 9 – Supports long-term storage of named files • Level 10 – Provides access to external devices using standardized interfaces
  • 39. Deal with External Objects • Level 11 – Responsible for maintaining the association between the external and internal identifiers • Level 12 – Provides full-featured facility for the support of processes • Level 13 – Provides an interface to the OS for the user