Professional Documents
Culture Documents
OS Ch1-Introduction-6 PDF
OS Ch1-Introduction-6 PDF
Chapter 1: Introduction
What Operating Systems Do
Computer-System Organization
Chapter 1: Introduction
Computer-System Architecture
Operating-System Structure
Operating-System Operations
Process Management
Memory Management
Storage Management
Protection and Security
Distributed Systems
Special-Purpose Systems
Computing Environments
Open-Source Operating Systems
Objectives
1.2
1.3
1.4
Operating system
Users
1.5
1.6
8/24/2008
approximation
1.7
Computer Startup
Computer-system operation
1.9
1.8
The one program running at all times on the computer is the kernel.
OS is a control program
Computer-System Operation
I/O devices and the CPU can execute concurrently
1.10
the interrupt vector, which contains the addresses of all the service
routines
Interrupt architecture must save the address of the interrupted instruction
Incoming interrupts are disabled while another interrupt is being processed
Device controller informs CPU that it has finished its operation by causing
an interrupt
request
An operating system is interrupt driven
1.11
1.12
8/24/2008
Interrupt Handling
Interrupt Timeline
The operating system preserves the state of the CPU by storing registers
polling
Separate segments of code determine what action should be taken for each
type of interrupt
1.13
I/O Structure
completion
Wait instruction idles the CPU until the next interrupt
Wait loop (contention for memory access)
At most one I/O request is outstanding at a time, no
simultaneous I/O processing
After I/O starts, control returns to user program without waiting
for I/O completion
1.14
After I/O starts, control returns to user program only upon I/O
memory speeds
Device controller transfers blocks of data from buffer storage directly to
byte
1.15
Storage Structure
Secondary storage extension of main memory that provides large
recording material
Disk surface is logically divided into tracks, which are subdivided into
sectors
1.17
Storage Hierarchy
Main memory only large storage media that the CPU can access directly
1.16
Speed
Cost
Volatility
1.18
8/24/2008
Storage-Device Hierarchy
Caching
Important principle, performed at many levels in a computer (in
there
1.19
Computer-System Architecture
1.20
mainframes)
Advantages include
1.
Increased throughput
2.
Economy of scale
3.
Two types
1.
Asymmetric Multiprocessing
2.
Symmetric Multiprocessing
1.21
1.23
1.22
A Dual-Core Design
1.24
8/24/2008
Clustered Systems
When it has to wait (for I/O for example), OS switches to another job
8th
Edition
1.25
1.26
Operating-System Operations
1.27
1.29
Process Management
1.28
1.30
8/24/2008
Memory Management
Keeping track of which parts of memory are currently being used and by
whom
Deciding which processes (or parts thereof) and data to move into and
out of memory
1.31
Storage Management
1.33
1.32
Mass-Storage Management
Usually disks used to store data that does not fit in main memory or data that
must be kept for a long period of time
Entire speed of computer operation hinges on disk subsystem and its algorithms
OS activities
Free-space management
Storage allocation
Disk scheduling
1.34
such that all CPUs have the most recent value in their cache
Distributed environment situation even more complex
1.35
1.36
8/24/2008
I/O Subsystem
user
1.37
do what
User identities (user IDs, security IDs) include name and
associated number, one per user
User ID then associated with all files, processes of that user to
determine access control
Group identifier (group ID) allows set of users to be defined and
controls managed, then also associated with each process, file
Privilege escalation allows user to change to effective ID with
more rights
Computing Environments
Traditional computer
Office environment
connected to a network, terminals attached to mainframe or
minicomputers providing batch and timesharing
Now
1.38
PCs
Client-Server Computing
Dumb terminals supplanted by smart PCs
Many systems now servers, responding to requests generated by
clients
Compute-server provides an interface to client to request
services (i.e. database)
Home networks
Used
Now
firewalled, networked
1.39
Peer-to-Peer Computing
1.40
Web-Based Computing
New category of devices to manage web traffic among similar servers: load
balancers
Use of operating systems like Windows 95, client-side, have evolved into
1.41
1.42
8/24/2008
binary closed-source
Counter to the copy protection and Digital Rights Management (DRM)
movement
Started by Free Software Foundation (FSF), which has copyleft GNU
End of Chapter 1
Sun Solaris
1.43