Professional Documents
Culture Documents
OS-Final
OS-Final
Storage recording it
Management magnetically.
o Read – write head
The management of the data “flies” just above each
storage equipment’s that is surface.
used to store the o Divided into Circular
user/computer generated tracks, which are
data. subdivided into
A tool or set of processes Sectors.
used by administrators to o Sector – has a fixed
keep your data and storage side and it is the
equipment safe. smallest unit of
A process for users to transfer; commonly
optimize the use of storage 512 bytes until 2010
devices and to protect the and migrating to 4KB
integrity of data. sector.
Key Attributes: Heads – are attached to a
o Performance Disk arm – that moves all the
o Reliability heads as a unit.
o Recoverability Cylinder – set of tracks at a
o Capacity given arm position.
o Each track may contain
Mass – Storage Structure hundreds of sectors.
The disc drive motor spins it
Hard Disk Drives (HDD) at high speed.
Each disk Platter – a flat o Rotate 60 to 250 times
circular shape; diameters per second or
range from 1.8 to 3.5 inches. Rotation per minute
(RPM)
o Rotation speed relates
to Transfer Rate.
Transfer Rate – the rate at
which data flow between the
drive and the computer.
Positioning Time/Random –
Access Time – consists of
two parts.
o Seek time – time
necessary to move the
disk arm to the desired
cylinder.
o Rotational latency –
the time necessary for
the desired sector to
o Two surfaces are rotate to the disk head.
covered with a Typical disks can transfer
magnetic material. tens of hundreds of
megabytes of data per
second, and they have seek o Solid – state – disk
times and rational latencies of (SSD)
several milliseconds. o USB drive – also
o DRAM buffers – known as thumb drive
increase performance. or flash drive or DRAM
Storage capacity measured in stick.
gigabytes and terabytes. NVM devices are more
Disk head flies on an reliable than HDDs.
extremely thin cushion o No moving parts and
(measured in microns) can be faster because
o The danger that the they have no seek time
head may make or rational latency.
contact with the disk o Consume less power.
surface is called Head o Negative side: More
Crash. expensive per
Head Crash – Head will megabyte; less
sometimes damage the capacity
magnetic surface. o SSDs and similar
o Cannot be repaired. devices are now used
o The entire disk must be in some laptop
replaced. computers to make
o Data on the disk are them smaller, faster,
lost unless they were and more energy
backed up to other efficient.
storage or RAID Some systems
protected. use it as a direct
HDDs are sealed units and replacement for
some chassis. disk drives.
o Allow their removal NAND semiconductor:
without shutting down Read and written in “page”
the system or storage increment but data can’t
chassis. overwrite.
o Removable – including Data must first be erased, and
CDs, DVDs and Blu – erases happen in larger
ray discs. “block.”
Can only be erased a limited
Nonvolatile Memory Devices number of times before worn
(NVM) out.
Electrical rather than NVM lifespan is not measured
mechanical. in years but in Drive Writes
The device is composed of a Per Day (DWPD) – measure
controller and flash NAND die how many times the drive
semiconductor chips; used to capacity can be written per
store data. day before it fails.
DRAM with battery backing so
it doesn’t lose its content. Volatile Memory Devices
Flash – memory – based DRAM is frequently used as a
NVM – frequently used in a mass – storage device.
disk – drive – like containers.
o Can have file system, Kinds of buses available:
be used like very fast o Advanced technology
secondary storage. attachment (ATA).
RAM drives (RAM disks) – o Serial ATA (SATA).
act like secondary storage but o eSATA
are created by devices drives o Serial Attached SCSI
that carve a section of the (SAS)
system’s DRAM. o Universal serial bus
o Present it to the rest of (USB)
the system as it if were o Fibr Channel (FC)
a storage device. Most common connected
The “drives” are used as raw method is SATA.
block devices. NVM devices are much faster
o File systems are than HDDs.
created on them for o Industry creates a
standard file operation. special, fast interface
DRAM is volatile, and data on for NVM devices called
a RAM drive does not survive NVM express (NVMe).
a system crash, shutdown, or Directly
power down. connects the
Caches and buffers are device to the
allocated by the programmer system PCI bus.
or operating system. Increasing
RAM drives allow the user to throughput and
place data in memory for decreasing
temporary safekeeping using latency.
standard file operations. Controller/Host – bus
o Used as high – speed adapters (HBA) – the data
temporary storage transfers on a bus are carried
space. out by special electronic
Managing RAM: processor.
Linux - /dev/ram Host controller – the
MacOS – controller at the computer end
diskutil of the bus.
Windows - third- o Can perform a mass
party tools storage I/O operation.
Solaris and Using memory –
Linus – create mapped I/O
/tmp and type ports.
“tmpfs.” o It sends commands via
NVM devices are fast, DRAM message to the Device
is much faster, and I/O controller.
operations to RAM drives are Device controller – built into
the fastest. each storage device.
o Usually has a built – in
Secondary Storage
cache.
Connection Methods
Data transfer at the drive
Attached to a computer by the
happens between the cache
system bus or an I/O bus.
and the storage media, and to
the host, at fast electronic o Divided by the total
speeds, occurs between the time between the first
cache and DRAM via DMA request for the service
and the completion of
Magnetic Tapes the last transfer.
If the desired drive and
an early secondary – storage controller are available, the
medium. request can be serviced
A nonvolatile and can hold immediately; if it’s busy, any
large quantities of data. new requests for service will
It accesses time is slow be placed in the queue of
compared with that of main pending requests for that
memory and drives. drive.
Random access to magnetic In Multiprogramming system –
tape is about thousands of device queue may often have
times slower than random several pending requests.
access of HDDs; a hundred In HDDs interface, much
thousand times slower than effort was spent on disk
random access of SSDs. scheduling algorithms.
Used mainly for backup,
storage of infrequently used FCFS Scheduling
information, and as a medium First Come, First Served
for transferring information. Simplest form of disk
A spool and is would or scheduling.
rewound past a read – write This algorithm is intrinsically
head. fair, but it generally does not
provide the fastest services.
HDD Scheduling
Cloud Storage
A purpose – built device that o to address the
includes SAN ports, network performance and
ports, or both. reliability issues.
Contains drives to store data The composition of small,
and a controller to manage cheap disks was viewed as a
the storage and allow access cost – effective alternative to
to the storage across the large, expensive disks.
networks. Used for their higher reliability
Controller – compose of and higher data – transfer
CPUs, memory and software rate rather than for economic
that implement the features of reasons.
the array. I in RAID once stood for
Easy to add or remove “Inexpensive”
storage, and new host and
locate it storage. Improvement of Reliability via
FC is common SAN Redundancy
interconnect.
InfiniBan (IB) – a special The solution to the problem of
purpose bus architecture that reliability is to introduce
provides hardware and redundancy.
software support for high – o Store extra information
speed interconnection that is not normally
network for the servers and needed but can be
storage units. used in the event of
disk failure to rebuild
Raid Structure the lost information.
RAID can be applied to NVM
Economically feasible to devices as well.
attach many drives to a Mirroring technique – the
computer system. simplest (but most expensive)
Having a large number of approach to introducing
drives in a system presents redundancy and it is to
opportunities for improving duplicate every drive.
the rate at which data can be o Every writing is carried
read or written, if the drives out on both drives.
are operated in parallel o The result is called a
This set up offers the potential mirrored volume.
for improving the reliability of Data will be lost only if the
data storage. second drive fails before the
Redundant information can be first failed drive is replaced.
stored on multiple drives. Mean Time Between Failure
Failure of one drive does not (MTBF) – failure is the loss of
lead to loss of data data
Redundant Array of Two factors:
Independent Disk (RAIDS) – o MTBF of the individual
Variety of disk – organization drivers.
techniques o the mean time to
repair, which is the
time it takes (on
average) to replace a multiple drives; such striping
failed drive and to is called Bit – level striping.
restore the data on it. In Block – level striping –
cannot really assume that blocks of a file are striped
drive failures will be across multiple drives.
independent. Two main goals:
o Power failures and o Increase the
natural disasters. throughput of multiple
As the drivers age, the small accesses (that is,
probability of failure grows. page accesses) by
mirrored-drive systems offer load balancing.
much higher reliability than do o Reduce the response
single-drive systems. time of large accesses.
Power failures are a particular RAID is frequently combined
source of concern, since they with NVRAM to improve write
occur far more frequently. performance and is arranged
Power fails before both blocks into six different levels
are fully written; the two
blocks can be in an RAID Levels
inconsistent state.
o One solution to this Mirroring provides high
problem is to write one reliability, but it is expensive.
copy first, then the Striping provides high data-
next. transfer rates, but it does not
o to add a solid-state improve reliability.
nonvolatile cache. To provide redundancy at
This write-back cache is lower cost by using disk
protected from data loss striping combined with “parity”
during power failures. bits.
These schemes have different
Improvement in Performance via cost–performance trade-offs
Parallelism and are classified according
to levels called RAID levels.
With mirroring, the rate at Three categories:
which read requests can be o Standard
handled is doubled, since o Nested
read requests can be sent to o Nonstandard
either drive.
The transfer rate of each read Standard RAID Level
is the same as in a single RAID 0
drive system, but the number o Has striping but no
of reads per unit time has redundancy of data.
doubled. o Offers the best
With multiple drives, we can performance, but it
improve the transfer rate as does not provide fault
well (or instead) by stripping tolerance
data across the drives. RAID 1
Data Striping – splitting the o Also known as Disk
bits of each byte across mirroring.
o Consists of at least two o based on parity block-
drives that duplicate level striping.
the storage of data. o The parity information
o No striping. is stripped across each
o Read performance is drive, enabling the
improved, since either array to function, even
disk can be read at the if one drive were to fail.
same time. o results in performance
o The write performance better than that of a
is the same as for single drive.
single disk storage. o RAID 5 requires at
RAID 2 least three disks.
o Uses striping across recommended
disks. to use at least
o Storing error checking five disks for
and correcting (ECC) performance
information. reasons.
o Uses a dedicated o generally considered to
Hamming code parity. be a poor choice for
o RAID 2 has no use on write-intensive
advantage over RAID 3 systems because of
and is no longer used. the performance
RAID 3 impact associated with
o uses striping and writing parity data.
dedicates one drive to RAID 6
storing parity o similar to RAID 5.
information. o a second parity
o embedded ECC scheme distributed
information is used to across the drives in the
detect errors. array.
o Data recovery is o The use of additional
accomplished by parity enables the
calculating the array to continue
exclusive information. functioning, even if two
o RAID 3 is best for disks fail
single-user systems simultaneously.
with long record o extra protection comes
applications. at a cost.
RAID 4 o RAID 6 arrays often
o uses large stripes. have slower write
o The user can read performance than
RAID 5 arrays.
records from any single
o Snapchat – a view of
drive.
o all write operations are the file system before
the last update took
required to update the
place.
parity drive, no I/O
o Replication –
overlapping is possible.
RAID 5 automatic duplication
of writes between
separate sites for store information on various
redundancy and storage media.
disaster recovery; can Devices, HDDs, magnetic
be synchronous or tapes, and optical disks.
asynchronous. File – mapped by the
In Synchronous, operating system onto
each block must physical devices.
be written locally o storage devices are
and remotely usually nonvolatile.
before the write o named collection of
is considered related information that
complete. is recorded on
In secondary storage.
asynchronous, o represent programs
the writes are (both source and
grouped object forms) and data.
together and
In general, a file is a
written
sequence of bits, bytes, lines,
periodically.
or records, the meaning of
o Hot spare - not used
which is defined by the file’s
for data but is creator and user.
configured to be used Types of Information:
as a replacement in o source or executable
case of drive failure.
programs
o The RAID level can be
o numeric
reestablished
o text data
automatically, without
o photos
waiting for the failed
drive to be replaced. o music
o Allocating more than o video
one hot spare allows o etc.
more than one failure Defined Structure:
to be repaired without o Text file - sequence of
human intervention. characters organized
into lines (and possibly
File – System Interface pages).
o Source file –
Two distinct parts: sequence of functions,
o a collection of files, each of which is further
each storing related organized as
data. declarations followed
o a directory structure, by executable
which organizes and statements.
provides information. o Executable file –
Most file systems live on series of code sections
storage devices. that the loader can
bring into memory and
File Concept execute.
File Attributes
File Operation
A file is named, for the
convenience of its human A file is an abstract data type.
users, and is referred to by its The operating system can
name. provide system calls to
o Usually a string of create, write, read, reposition,
characters. delete, and truncate files.
When a file is named, it Six Basic File Operations:
becomes independent of the o Creating File – Two
process, the user, and even steps; space in the file
the system that created it system must be found
Typically consists of: for the file, and an
Name – the only information entry for the new file
kept in human-readable form. must be made in the
Identifier – identifies the file directory.
within the file system; it is the o Writing a File – Make
nonhuman-readable name for a system call
the file. specifying both the
Type – needed for systems name of the file and
that support different types of the information to be
files. written to the file.
Location – a pointer to a Writing pointer
device and to the location of – the location in
the file on that device. the file where
Size – current size of the file the next write is
Protection – Access-control to take place;
information determines who must be
can do reading, writing, updated
executing, and so on. whenever a
Time, date and user write occurs.
identification – This o Reading a File – use a
information may be kept for system call that
creation, last modification, specifies the name of
and last use. the file and where (in
o useful for protection, memory) the next block
security, and usage of the file should be
monitoring. put.
Read pointer –
Extended file attributes –
to the location in
character encoding of file and
the file where
security features checksum.
the next read is
File info window – displays a
to take place.
file’s attributes.
Both the read
Directory Structure – it is a and write
collection of nodes collecting operations use
information about files. this same
Directory entry consists of the pointer, saving
file’s name and its unique space and
identifier. reducing system
complexity.
o Reposition within a o File pointer - unique to
File – Directory is each process operating
searched for the on the file and
appropriate entry, and therefore must be kept
the current-file-position separate from the on-
pointer is repositioned disk file attributes.
to a given value. o File – open count –
Also known as tracks the number of
Seek opens and closes and
o Deleting a File – reaches zero on the
search the directory for last close.
the named file; we o Disk location of the
release all file space, file – information
so that it can be reused needed to locate the
by other files, and file on disk is kept in
erase the directory memory.
entry. o Access rights –
o Truncating a File – stored on the per-
user may want to erase process table; the
the contents of a file operating system can
but keep its attributes. allow or deny
remain subsequent I/O
unchanged requests.
except for file o File lock – allow one
length process to lock a file
but lets the file and prevent other
be reset to processes from gaining
length zero and access to it.
its file space useful for files
released. that are shared
o Open (Fi) – move the by several
content of entry to processes.
memory. Same
o Close (Fi) – In memory functionality as
to directory structure read – write
on disk. lock.
To avoid this constant o Shared Lock – akin to
searching a reader lock in that
open () system call be made several processes can
before a file is first used. acquire the lock
Open – file table – OS table; concurrently.
containing information about o Exclusive Lock -
all open files. behaves like a writer
Open count - associated with lock; only one process
each file to indicate how many at a time can acquire
processes have the file such a lock.
opened. o Mandatory/Advisory
Associated with Open File: file – locking
mechanisms
If a lock is
mandatory, then
once a process
acquires an
exclusive lock,
the operating
system will
prevent any
other process
from accessing
the locked file.
File Types
Direct Access
Common Concept
User
It occurs when the user
changes.
Process
It occurs when one process
sends a message to another
process and then waits for a
response.
Procedure Three copy right:
Occurs when a procedure call Copy
is made. Transfer
Limited Copy
ACCESS MATRIX
2. Owned
The general model of o Allows additional of
protection can be viewed new rights and
abstractly as a matrix. removal of some
Rows represent Domain. rights.
Columns represent Object.
Consists of ordered pairs
<domain, right-set>.
Define all domains with a
non-empty set of access
right for that object.
A Lock-Key Mechanism
A compromise between
access lists and capability
lists.
Locks
Confinement Problem o Each object has a list
Generally unsolvable. of unique bit patterns.
Problem of guaranteeing that Keys
no information initially held in o Each domain has a list
an object can migrate outside. of unique bit patterns.
IMPLEMENTATION OF THE ACCESS CONTROL
ACCESS MATRIX
Can be used on files within a
Several methods file system.
Global Table Role-Based Access Control
Consist of a set of ordered (RBAC)
triples <domain, object, Solaris 10 advances the
rights-set>. protection available in the
Drawback: operating system by explicitly
o Tables are usually adding the principle of least
larger and thus privilege.
cannot be kept in
main memory. Privilege
o Virtual memory The right to execute a
techniques are often system call or to use an
used. option within that system
call.
Access List for Object Can be assigned to
Each column for one object, processes, limiting them to
the empty entries can be exactly access they need to
discarded. perform.
The capabilities point
indirectly, not directly, to
the objects.
Keys
A unique bit pattern that can
be associated with a
capability.
It can be neither modified
nor inspected by the process
that owns the capability.
Master key
o Associated with each
object; it can defined
or replaced with the
set-key operation.
Trap Door
The designer of a program or
system might leave a hole in
the software that only she
is capable of using.
Logic Bomb
PROGRAM THREATS A predefined set of
parameters was met, the
Processes, along with the security hole would be
kernel are the only means created.
of accomplishing work.
o Breach of security is Stack and Buffer Overflow
the common goal of On a network or dial-up
cracker. connection, to gain
unauthorized access to the
Trojan Horse target system.
A code segment that
misuses its environment. Virus
Variation: A fragment of code
A program that emulates a embedded in a legitimate
login program program.
A self-replicating and are
Spyware designed to “infect” other
o To download ads to programs.
display on the user’s Once a virus reaches a target
system, create pop- machine, virus dropper
up browser windows inserted the virus into the
when certain sites system.
are visited or capture Types of Viruses:
information from the File
user’s system and o Infects a system by
return it to a central appending itself to a
site. file.
o Also known as Covert Boot
channels.
o It infects the boot Multipartite
sector of the system, o Infect multiple parts of
executing every time a system.
the system is booted Armored
and before the o a coded virus to make
Operating System is it hard for antivirus
loaded. researchers to
Macro unravel and
o Written in a high-level understand.
language.
o It triggered when a Keystroke logger
program capable of Records everything entered
executing the macro is on the keyboard.
run.
Source code Monoculture
o It looks for source Many systems run the same
code and modifies is hardware, operating system,
to include the virus and application software.
and to help spread the
virus. SYSTEM AND NETWORK
Polymorphic THREATS
o It changes each time
it is installed to avoid Program threats typically use
detection by antivirus a breakdown in the protection
software. mechanisms of a system to
Virus signature attack programs.
A pattern that The more open an operating
can be used to system is the more services it
identify a virus, has enabled and the more
typically a series functions it allows; and the
of bytes that more likely it is that a bug is
make up the available to exploit.
virus code. Masquerading and Replay
Encrypted attacks are also commonly
o Decryption code launched over networks
along with the between systems.
encrypted virus to
avoid deletion. Attack Surface
Stealth The set of ways in which an
o It is modifying parts attacker can try to break
of the system that into the system.
could be used to detect
it. Worms
Tunneling A process that uses the
o Bypass detection by an spawn mechanism to
antivirus scanner by duplicate itself.
installing itself in the It copies itself, using up
interrupt-handler system resources and
chain.
perhaps locking out all other o Disrupting the network
processes. of the facility.
Cryptography
Used to constrain the
potential senders and/or
receivers of a message.
Main program Enable a recipient of a
o To search for other message to verify that the
machines to which the message was created by
newly infected system some computer possessing a
could connect easily. certain key.
The action has been
characterized as both a Keys
harmless prank gone away Selectively distributed to
and a serious criminal computers in a network and
offense. used to process messages.
Systems
3 kinds of Organization Multiple
Processors
SHARED-MEMORY
MULTIPROCESSOR
Omega Network
Directory-based NUMA
architecture
that they want to call or
read
o Four steps leading to
an error demonstrated.
The TSL instruction
o Have a User mode and may fail if the bus
Kernel Mode operation blocking fails. Blocking
o Partitioning of bus/crossbar is
multiprocessor memory required.
based on how many
CPUs are but sharing a Multicore
single copy of the
operating system code.
Multiprocessor Synchronization
MULTICOMPUTER
Network Hardware
Heuristic algorithm:
Figure A. An overloaded node o In terms of
looking for a lightly loaded multicomputer, it
node to hand off process connects using each
Figure B. An empty node network interface, with
looking for a work to do the use of board RAM
The Internet
o Each message has its
own unique IP and
TCP
Network Service
File System-Based Middleware
o Figure A.
Upload/Download
o Connection-oriented: model
no interference, no o Figure B. Remote
delay Access model
o Connectionless:
Need of address and VIRTUAL MACHINE
do the routing, it might Fundamental Idea – abstract
have some delay and hardware of a single
subdivided into computer into several
different type of different execution
packets; unreliable; environments
might have some data o Basically, creating a
loss computer inside a
computer
Document-Based Middleware o Host – underlying
hardware system
o Virtual Machine
Manager (VMM) or
Hypervisor – creates
and runs virtual
machines by providing
o WWW pages create a big,
interface that is
directed graph of
identical to the host
documents, referencing
o Guest – process
provided with virtual
Packet Headers
copy of the host
o A single physical
machine can run
multiple operating
systems concurrently,
each in its own Virtual
Machine
System Models
Paravirtualization
Technique in which the guest
operation system is modified
to work in cooperation with
Hypervisor Implementation the VMM to optimize
Type 0 – Hardware-based performance
solutions that provide support
for virtual machines creation Programming-environment
and management via Virtualization
firmware Do not virtualize real
Type 1 – Operating-System- hardware but instead create
Like Software built to provide an optimized virtual system
virtualization o Run in different level of
o Also includes general- environment
purpose operating
systems that provide Emulators
standard functions as Allow application written for
well as VMM function one hardware environment to
o Direct creation of VM run on a very different
Type 2 – Applications that run hardware environment, such
on standard operating as a different type of CPU
systems but provide VMM o Use to run a different
features to guest operating kind of application if
systems the system does not
o Implementation – it have a specific kind of
uses hosted OS that requirements that has
need to manage before been meet
using the creating an
VM and communicate Application Containment
using the Hypervisor Not virtualization at all but
rather provided virtualization-
Hypervisor Types like features by segregating
applications from the
operating system, making
them more secure and
manageable
o Use to test and run in Input allowing the users to
different type kind of control the system or to enter
OS using the VM information
Output allowing the system to
Is their contemporary processing inform the user (feedback)
power huge enough to resolve all
research/everyday problems? Command-Line Interface (CLI)
Uses text commands and a
How scalable are computer method for entering them (a
systems? keyboard for typing in
commands in a specific
What is better: connected format with specific options).
autonomous systems or many It provides a command-line
processors with shared memory? interface, or command
interpreter, that allows users
INTERFACING TO to directly enter commands to
be performed.
OPERATING
Graphical User Interface (GUI)
SYSTEMS AND THE The interface is a window
SPECIAL-PURPOSE system with a pointing device
to direct I/O, choose from
SYTEM menus, and make selections
and a keyboard to enter text.
Interfacing with operating
systems Touch-Screen Interface
Crucial for software Interact by making gestures
development, as it allows on the touch screen.
applications to leverage the
capabilities of the underlying Batch Interface
system; Utilizing operating Non-interactive user
system interfaces. interfaces, where the users
specifies all the details of the
Special-purpose System batch job in advance to batch
A systems designed for processing and receives the
specific tasks or industries, output when all the
often requiring custom processing is done.
interfaces to interact with
them Choice of Interface
Whether to use a command-
INTERFACING TO OPERATING line or GUI is mostly one of
SYSTEMS personal reference.
System Administrators
The User Interface manage computer, Power
The aggregate of means by Users with deep knowledge
which people (users) interact of a system.
with a particular machine, Shell Scripts are very
device, computer program or common on systems that are
other complex tool (system) command-line oriented.
THE OERATING SYSTEM Interrupts Handler
INTERFACE Installed at the target address
The mechanisms for invoking for interrupts; it restores the
the operating system are states of the process that was
Interrupts. executing when the interrupt
Modern computers will go into occurred.
a special mode called
System Mode when they THE SPECIAL-PURPOSE
handle an interrupts. SYSTEMS
Designed and optimized for
Interrupts specific tasks or
It stops what It is doing and environments; it tailored to
immediately transfers meed the unique
execution to a fixed location, requirements of the targeted
usually contain the starting domain.
address where the service
routine for the interrupts is Real-Time Embedded Systems
located. Designed to handle events as
o Software Interrupts - they occur; commonly found
invoked by software. and used in robotics.
o External Interrupts - Real-Time OS is designed for
invoked by external system that requires precise
devices. timing and quick response to
o Exceptions - invoked external events.
by the processor when
errors occurs. Multimedia Systems
A comfortable environment for
Software Interrupts the execution of programs,
Triggered by executing and it ensures effective
program to request operating utilization of the computer
system service hardware.
Application Program
Interface (API) high-level Handheld and Portable Systems
languages usually provide a Refers to small portable
higher-level operating system devices that can be carried
interface. along and are capable of
performing normal operations.
System Calls Small computer pocket side
Provide an interface to the computing system or
services made available by an handheld is any portable
operating system. devices.
System Mode
Do things that its cannot do in
the normal mode, which is
called User Mode.
The foundation of OS
Security.
o
o
o