The document discusses three key components of operating systems: secondary storage management, protection and security, and operating system structure. For secondary storage management, it describes how the OS manages disk storage through functions like free space management, storage allocation, and disk scheduling. It then explains that protection controls access to resources, while security defends against attacks. Finally, it briefly outlines different models for operating system structure, such as monolithic, layered, virtual machine, client-server, and microkernel.
The document discusses three key components of operating systems: secondary storage management, protection and security, and operating system structure. For secondary storage management, it describes how the OS manages disk storage through functions like free space management, storage allocation, and disk scheduling. It then explains that protection controls access to resources, while security defends against attacks. Finally, it briefly outlines different models for operating system structure, such as monolithic, layered, virtual machine, client-server, and microkernel.
The document discusses three key components of operating systems: secondary storage management, protection and security, and operating system structure. For secondary storage management, it describes how the OS manages disk storage through functions like free space management, storage allocation, and disk scheduling. It then explains that protection controls access to resources, while security defends against attacks. Finally, it briefly outlines different models for operating system structure, such as monolithic, layered, virtual machine, client-server, and microkernel.
The document discusses three key components of operating systems: secondary storage management, protection and security, and operating system structure. For secondary storage management, it describes how the OS manages disk storage through functions like free space management, storage allocation, and disk scheduling. It then explains that protection controls access to resources, while security defends against attacks. Finally, it briefly outlines different models for operating system structure, such as monolithic, layered, virtual machine, client-server, and microkernel.
OS Components • Secondary Storage Management: – Since main memory (primary storage) is volatile and too small to accommodate all data and programs permanently, the computer system must provide secondary storage to back up main memory. – Common secondary storage devices: Magnetic disk and Optical disk – Task of Secondary Storage Management of OS: • Free space management • Storage allocation • Disk scheduling Protection and Security • Protection – any mechanism for controlling access of processes or users to resources defined by the OS • Security – defense of the system against internal and external attacks – Huge range, including denial-of-service, worms, viruses, identity theft, theft of service Protection and Security • Systems generally first distinguish among users, to determine who can do what – User identities (user IDs, security IDs) include name and associated number, one per user – User ID then associated with all files, processes of that user to determine access control – Group identifier (group ID) allows set of users to be defined and controls managed, then also associated with each process, file – Privilege escalation allows user to change to effective ID with more rights Operating System Structure – Monolithic system – Layered System – Virtual Machine – Client-server model – Microkernel –