chapter 3: operating systems
DESCRIPTION
Chapter 3: Operating Systems. Computer Science: An Overview Tenth Edition by J. Glenn Brookshear. Chapter 3: Operating Systems. 3.1 The History of Operating Systems 3.2 Operating System Architecture 3.3 Coordinating the Machine’s Activities 3.4 Handling Competition Among Processes - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/1.jpg)
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Chapter 3: Operating Systems
Computer Science: An OverviewTenth Edition
by J. Glenn Brookshear
![Page 2: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/2.jpg)
3-2Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Chapter 3: Operating Systems
• 3.1 The History of Operating Systems
• 3.2 Operating System Architecture
• 3.3 Coordinating the Machine’s Activities
• 3.4 Handling Competition Among Processes
• 3.5 Security
![Page 3: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/3.jpg)
3-3Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Functions of Operating Systems
• Oversee operation of computer
• Store and retrieve files
• Schedule programs for execution
• Coordinate the execution of programs
![Page 4: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/4.jpg)
3-4Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Evolution of Shared Computing
• Batch processing
• Interactive processing– Requires real-time processing
• Time-sharing/Multitasking– Implemented by Multiprogramming
• Multiprocessor machines
![Page 5: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/5.jpg)
3-5Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Figure 3.1 Batch processing
![Page 6: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/6.jpg)
3-6Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Figure 3.2 Interactive processing
![Page 7: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/7.jpg)
3-7Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Types of Software
• Application software– Performs specific tasks for users
• System software– Provides infrastructure for application software– Consists of operating system and utility
software
![Page 8: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/8.jpg)
3-8Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Figure 3.3 Software classification
![Page 9: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/9.jpg)
3-9Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Operating System Components
• Shell: Communicates with users– Text based– Graphical user interface (GUI)
• Kernel: Performs basic required functions– File manager– Device drivers– Memory manager– Scheduler and dispatcher
![Page 10: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/10.jpg)
3-10Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Figure 3.4 The shell as an interface between users and the operating system
![Page 11: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/11.jpg)
3-11Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
File Manager
• Directory (or Folder): A user-created bundle of files and other directories (subdirectories)
• Directory Path: A sequence of directories within directories
![Page 12: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/12.jpg)
3-12Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Memory Manager
• Allocates space in main memory
• May create the illusion that the machine has more memory than it actually does (virtual memory) by playing a “shell game” in which blocks of data (pages) are shifted back and forth between main memory and mass storage
![Page 13: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/13.jpg)
3-13Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Getting it Started (Bootstrapping)
• Bootstrap: Program in ROM (example of firmware)– Run by the CPU when power is turned on– Transfers operating system from mass storage
to main memory– Executes jump to operating system
![Page 14: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/14.jpg)
3-14Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Figure 3.5 The booting process
![Page 15: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/15.jpg)
3-15Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Processes
• Process: The activity of executing a program
• Process State: Current status of the activity– Program counter– General purpose registers– Related portion of main memory
![Page 16: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/16.jpg)
3-16Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Process Administration
• Scheduler: Adds new processes to the process table and removes completed processes from the process table
• Dispatcher: Controls the allocation of time slices to the processes in the process table– The end of a time slice is signaled by an
interrupt.
![Page 17: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/17.jpg)
3-17Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Figure 3.6 Time-sharing between process A and process B
![Page 18: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/18.jpg)
3-18Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Handling Competition for Resources
• Semaphore: A “control flag”
• Critical Region: A group of instructions that should be executed by only one process at a time
• Mutual exclusion: Requirement for proper implementation of a critical region
![Page 19: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/19.jpg)
3-19Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Deadlock
• Processes block each other from continuing
• Conditions required for deadlock1. Competition for non-sharable resources
2. Resources requested on a partial basis
3. An allocated resource can not be forcibly retrieved
![Page 20: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/20.jpg)
3-20Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Figure 3.7 A deadlock resulting from competition for nonshareable railroad intersections
![Page 21: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/21.jpg)
3-21Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Security
• Attacks from outside– Problems
• Insecure passwords• Sniffing software
– Counter measures• Auditing software
![Page 22: Chapter 3: Operating Systems](https://reader035.vdocuments.site/reader035/viewer/2022081503/56815aca550346895dc89b98/html5/thumbnails/22.jpg)
3-22Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Security (continued)
• Attacks from within– Problem: Unruly processes– Counter measures: Control process activities
via privileged modes and privileged instructions