0% found this document useful (0 votes)
56 views

Chapter 1 (Lecture 5) Operating System by Ihap El-Galaly

The document discusses several topics related to operating systems, including I/O subsystems, protection and security, virtualization, distributed systems, computing environments like client-server and peer-to-peer networks, cloud computing, and real-time embedded systems. Specifically, it describes how the I/O subsystem handles buffering, caching and spooling of data, protection and security through user IDs and privileges, virtualization allowing multiple guest OSes, different types of networks, and characteristics of real-time embedded systems with time constraints.

Uploaded by

marten mistry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

Chapter 1 (Lecture 5) Operating System by Ihap El-Galaly

The document discusses several topics related to operating systems, including I/O subsystems, protection and security, virtualization, distributed systems, computing environments like client-server and peer-to-peer networks, cloud computing, and real-time embedded systems. Specifically, it describes how the I/O subsystem handles buffering, caching and spooling of data, protection and security through user IDs and privileges, virtualization allowing multiple guest OSes, different types of networks, and characteristics of real-time embedded systems with time constraints.

Uploaded by

marten mistry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Chapter 1(lecture 5) Operating System by Ihap El-galaly

I/O Subsystem
One purpose of OS is to hide peculiarities of hardware devices from
the user.
I/O subsystem responsible for:
•Memory management of I/O including buffering (storing data
temporarily while it is being transferred), caching (storing parts of data
in faster storage for performance), spooling (the overlapping of output of
one job with input of other jobs).
Two methods for handling I/O:
Synchronous: After I/O starts, control returns to user program only upon
I/O completion:
Asynchronous :After I/O starts, control returns to user program without
waiting for I/O completion:

Protection – any mechanism for controlling access of processes or


users to resources defined by the OS.
A protection-oriented system provides a means to distinguish between
authorized and unauthorized usage.
Security – defense of the system against internal and external attacks
Protection and security require the system to be able to distinguish
among all its users, to determine who can do what:
•User identities (user IDs, security IDs) include name and associated
number (unique), one per user.
•User ID then associated with all files, processes, and threads of that
user to determine access control.
•Group identifier (group ID) allows set of users to be defined and
controls managed, then also associated with each file, process, and
thread.
•Privilege escalation allows user to change to effective ID with more
rights.
A user sometimes needs to escalate privileges to gain extra
permissions for an activity.
Virtualization:
Allows operating systems to run as applications within other OSes.
Virtualization – OS natively compiled for CPU, running guest OSes
also natively compiled.
Windows was the host operating system, and the VMware application
was the virtual machine manager (VMM).
•VMM provides virtualization services.
With my Best wishes 2022 Eng Ihap EL-Galaly 01062665758 14
VMM runs the guest operating systems, manages their resource use,
and protects each guest from the others.

Distributed Systems: Collection of separate, possibly heterogeneous,


computer systems networked together:
•A network is a communication path between two or more systems.
TCP/IP is the most common network protocol.
Networks are characterized based on the distances between their
nodes:
Local Area Network (LAN) connects computers within a room, a
building, or a campus.
Wide Area Network (WAN) usually links buildings, cities, or
countries.
Metropolitan Area Network (MAN) could link buildings within a city.
Personal Area Network (PAN) between a smartphone and a
desktop computer
Network Operating System is an operating system that provides
features between systems across network.
Computing Environments
Traditional: Stand-alone general-purpose machines.
 this environment consisted of PCs connected to a network, with
servers providing file and print services.
•Remote access was difficult, and portability was achieved by use of
laptop computers.
Network computers (or thin clients)—which are essentially terminals
are used in place of traditional workstations where more security or
easier maintenance is desired.
Mobile devices can also connect to wireless networks and cellular
data networks to use the company’s web portal.
Even home systems use firewalls to protect home computers from
Internet attacks.
With my Best wishes 2022 Eng Ihap EL-Galaly 01062665758 15
•Firewalls limit the communications between devices on a network.
Mobile computing: refers to computing on handheld smartphones,
tablets, etc.
•These devices share the distinguishing physical features of being
portable and lightweight.
Two operating systems currently dominate mobile computing: Apple
iOS and Google Android.
The memory capacity and processing speed of mobile devices are
more limited than those of PCs.
Client Server: Contemporary network architecture features
arrangements in which server systems satisfy requests generated by
client systems:
Servers responding to requests generated by clients.

Server systems can be broadly categorized as compute servers and file


servers
Compute-server system provides an interface to client to request
services. A client can send a request to perform an action (for example,
read data). In response, the server executes the action and sends the
results to the client.
File-server system provides an interface for clients to store and
retrieve files
Peer-to-Peer: does not distinguish clients and servers:
• Instead all nodes are considered peers.
• May each act as client, server or both.
• Node must join P2P network
Broadcast request for service and respond to requests for service via

With my Best wishes 2022 Eng Ihap EL-Galaly 01062665758 16


Cloud Computing: is a type of computing that delivers computing,
storage, and even applications as a service across a network.
It is a logical extension of virtualization because it uses virtualization as
the base for its functionality.
Many types:
•Public cloud – available via Internet to anyone willing to pay for the
services.
•Private cloud – run by a company for the company’s own use.
•Hybrid cloud – includes both public and private cloud components.
•Software as a Service (SaaS) – one or more applications available via
the Internet (e.g. word processor or spreadsheets).
•Platform as a Service (PaaS) – a software stack ready for application
use via the Internet (e.g. a database server).
•Infrastructure as a Service (IaaS) – servers or storage available over
Internet (e.g. storage available for backup use).

Real-Time Embedded Systems


Embedded computers are the most prevalent form of computers in
existence.
•They tend to have very specific tasks.
•The systems they run on are usually primitive, and so the operating
systems provide limited features.
•Usually, they have little or no user interface.
Embedded systems almost always run real-time operating systems.
•A real-time system has well-defined, fixed time constraints.
•Processing must be done within the defined constraints, or the system
will fail.
•A real-time system functions correctly only if it returns the correct result
within its time constraints.
•Contrast this system with a traditional laptop system where it is
desirable (but not mandatory) to respond quickly.

With my Best wishes 2022 Eng Ihap EL-Galaly 01062665758 17

You might also like