Notes of Operating System
Notes of Operating System
Section A
Operating system is collection of system and application software which create a link
between user and computer machine. So that user can easily perform basic function
on computer machine such that I/O functions. In simple word we say that Operating
system is a program that acts as an interface between user and computer machine
Modern operating systems use a graphical user interface also called GUI. A GUI lets
you use your mouse to click icons, buttons, and menus, and everything is clearly
displayed on the screen using a combination of graphics and text. For example
Microsoft operating likes Windows 7, windows 10. Some other operating system are
6. To provide efficient and fair sharing of resources among users and programs.
Operating System)
(1) Memory Management: - operating System Keeps track of the primary memory,
i.e. what part of it is in use by whom, what part is not in use, etc. and allocates the
resources including keyboard, mouse, printer, monitor, storage devices and memory.
(3) File system: - When a file is saved, the operating system saves it, attaches a
name to it, and remembers where it put the file for future use. The way an operating
(4) Providing a user interface: – The user interface (UI) is the point of human-
Graphical User Interface (GUI) in which graphic objects called icons are used to
(5) Managing Resources: - Operating system manages all of the software and
hardware on the computer. Most of the time, there are several different computer
programs running at the same time, and they all need to access your computer's
central processing unit (CPU), memory, and storage. The operating system
coordinates all of this to make sure each program gets what it needs.
(6) Running applications: - Controls and monitors the execution of all other programs
that reside in the computer, including application programs and other system
software.
(7) Support for built-in utility programs: - The operating system uses utility
programs for maintenance and repairs. Utility programs help identify problems,
The parts of an operating system all exist so as to make the various parts of a
computer system work together. These components are interrelated and connected
in a way to achieve the major function of operating system. Following are the major
2. Process manager
3. Interrupts
4. File manager
5. Memory Manager
6. Security Management
7. User Interface
first and remains in memory until the operating system is shut down again.
The kernel is responsible for low-level tasks such as disk management, task
to accomplish its task, process needs the computer resources. There may be
more than one process running in the system which may require the same
resource at the same time. Therefore, the operating system has to manage all
the processes and the resources in a convenient and efficient way. Process
3. Interrupts:- A signal that gets the attention of the CPU . For example,
hardware interrupts are generated when a key is pressed or when the mouse
is moved. When an interrupts occur they tell the CPU to stop its current
user manage all the files on their computer. For example, all file managers
allow the user to view, edit, copy, and delete the files on their computer
storage devices.
external security.
out the directory framework and requests services from the operating system
that will obtain information from input hardware devices and demands
word processor and a file system for long term storage of information.
are used for special purpose. In simple word we say that these operating
are used for such tasks as navigation, in which the computer must react to a steady
systems are not real-time because they can take a few seconds, or even minutes, to
react. Real time can also refer to events simulated by a computer at the same speed
that they would occur in real life. In graphics animation, for example, a real-time
program would display objects moving across the screen at the same speed that
they would actually move. For example CC TV system, navigation system, weather
forecasts
A multi-user operating system is the Systems that allow multiple users that are on
A single-user operating system is a type of system that has been developed and
designed to use on a single computer. It is used by only one user at a time. It is the
This type of OS is just better version of Real time OS, where one User can use the
computer to do one thing at a time, which means that doing thing more than one
thing at a time is difficult in this type of OS. The handhelds or the palmtop computers
are good examples of this type of systems. For example Windows mobile and MS
DOS etc.
3) Multi-tasking Operating Systems:
Multitasking is the ability of a computer to run more than one program, or task , at
the same time. The operating system is able to keep track of where you are in these
tasks and go from one to the other without losing information. Multitasking also
A multiprocessing operating system is one that can run on computer systems that
contain more than one processor. This type of Operating system has great speed.
These types of systems are used when very high speed is required to process a
large volume of data. The whole task of multiprocessing is managed by the operating
the system.
the program, called threads, simultaneously. This type of operating system needs a
processors to the operating system and the application program s that use it.
with each other, gave rise to distributed computing. Distributed computations are
carried out on more than one machine. Windows 2003 + application server
operating System?
A desktop operating system is one that is intended for a desktop computer Also
called a “client operating system”. These OS usually come with things that one would
probably use at a desk. For example, Windows sometimes comes with Microsoft
Office pre-installed. These types of operating system provide its resources to only
servers, which are special computers that operate within client/server architecture to
serve the requests of client computers on the network. Server OS provide a platform
for multi-user applications, and most come bundled with a batch of common server
applications, such as Web servers, e-mail agents and terminal services. Server
systems include Red Hat Enterprise Linux, Windows Server, Mac OS X Server.
user types the name of a program it is then task for operating system to validate it,
Job: When operating system validates it then it becomes a job for operating system.
Process: When job is loaded into memory & it is ready for execution then it is called
a process,
What Is Scheduling?
called scheduling. We also say that the process, which arranges different process
according to their priority, is called scheduling. If more than one process are able to
execute then operating system must decide which one to run first. The part of
operating system concerned with these decisions is called 'scheduler', and the
1) Preemptive Scheduling
1. Pre-emptive Scheduling: -
It is that mode of execution in which a process may be swapped from C P.U before
the system, then execution of current process is stopped and C.P.U is assigned to
meantime P2 with size 1 kB arrives. Now P2 have higher priority due to less memory
If a process is assigned to C P U and is not swapped out before its completion then
emptive scheduling.
another process P2 with 2Kb arises to the system, but the process P2 will have to
wait (although P2 will have memory size less then P1) until P1 is completed.
In this kind of scheduling all the processes are given equal time of C.P.U called time
slice or quantum. If a process is not completed before its C.P.U time expires then the
C.P.U is taken away and given to the next waiting process & pre-empted process is
It is also called shortest remaining time (SRT). In this algorithm all incoming jobs are
placed to their size. A job, which has less memory requirement, will be assign to
CPU first. So that shortest job will be assign to CPU. During the execution another
process arrive which have highest priority. So currently executed process will
compare to the newly arrived process. If the remaining part of currently executed
process is greater then the new process then currently executed process will
stopped and CPU assign to new process. If the remaining part of currently executed
process is less then the new process then CPU not terminate the Currently process.
According to this algorithm the incoming jobs are placed in a queue and processed
one by one at FIFO basis. A job at front of queue is allowed to use C. P.U. Once the
job is assigned to C.P.U then C.P.U cannot be taken away from it, until it is
completed. So processes are executed according to their arrival time means First in
First out.
In this algorithm incoming jobs are placed in stack & C.P.U is assigned to job that is
at the top of stack. A Process with lowest real time (arrival time) will be executed
first.
According to this algorithm first of all processes are arranged according to their
memory size and shortest job is assigned the highest priority. It means that a job
Disk some time referred to as a diskette is a storage device. Where data is recorded
one or more rotating disks. The most commonly found disks with a computer are the
These are also called 'fixed disks’ because the storage media is mounted within the
computer and not intended to be removed. Hard drives consist of one or more metal
platters stacked together on a single spindle. Multiple read/write heads float next to
Floppy Disk:
These disks are designed to allow users to store data to a disk, remove it and carry
the data elsewhere. These typically come in one of two formats in the 3.5 inch
Optical disk:
An optical disk is any computer disk that uses optical storage techniques and
technology to read and write data. An optical disk is a permanent storage device. A
laser beam used to read and write data on an optical disk. It can store data up to 1
GB.
CD-ROM:
CD-ROM stands for compact disk read-only memory. The data stored on CD-ROM
DVD:
DVD stands for digital video disk. It is similar to CD-ROM. It uses a laser beam with
a short wavelength. The short wavelength reads smaller holes on the disk.
WORM Disks:
WORM stands for write once read many. It can only be read and cannot be updated
or changed. It can store greater volumes of information than CD-ROM. Its capacity is
200 GB.
enable read and write storage. A 5 ½ inch rewritable disk can store up to 5 GB.
These are normally used for applications using large volumes of storage with little
update activity.
A disk partition or partition enables users to divide a physical disk into logical
sections. For example, allowing multiple operating systems to run on the same
device. In old File system like FAT 16 which are not sport a big partition more than
40 GB then we must create partition allows a computer hard drive to run more
Types of Partition:
Primary Partition:
Primary Partition is the hard disk partition where both Windows OS and other data
can be stored, and it is the only partition that can be set active. Early MBR supports
up to 4 primary partitions. Now GPT disk can be divided into 128 primary partitions at
least.
Extended Partition:
Because the primary only can be created four maximum, this need to use extended
create unlimited logical drives. Extended partition is not used to store data, because
Logical Partition:
Also called logical partition. A volume created within an extended partition on a basic
disk. A logical drive can be formatted and assigned a drive letter, but cannot host an
operating system.
MBR:
MBR, Master Boot Record, is a boot sector at the very beginning of computers' hard
drive. MBR hard disk can be divided into 4 primary partitions at most and it supports
GPT:
GUID Partition Table (GPT) is a standard for the layout of the partition table on a
physical hard disk, using globally unique identifies. It has many good features.
extended partition and logical partition. Secondly, it can support 18EB hard disk.
What is Register?
A processor register (CPU register) is one of a small set of data holding places that
are part of the computer processor. A register may hold an instruction, a storage
address, or any kind of data. Some instructions specify registers as part of the
instruction. For example, an instruction may specify that the contents of two defined
What is interpreter?
phrases from the English human language such as language. But a computer does
not understand high-level language. It only understands program written in 0's and
1's in binary, called the machine code. A program written in high-level language is
called a source code. We need to convert the source code into machine code and
What is Compiler?
Compiler is also a program that converts the source code written in high-level
language into machine code understood by the computer. Compiler read the entire
program and translates it as a whole into machine code. Programming language like
devices. The devices are identified by the hardware address of the physical memory
(the physical address). The address is stored in the form of binary numbers to
Section B
Requirements of window 7
Installation of window 7
2. After booting a message appear on the screen. “Press and key to Boot Form
CD”
4. The next screen allows you to setup your language, time and currency format,
keyboard or input method. Choose your required settings and click next to
continue.
5. The next screen allows you to install or repair Windows. We will click on
"install now".
6. In Next Step Read over the Microsoft Software License Terms, check I accept
9. Windows 7 starts the installation process and starts copying all the necessary
10. It will go through various stages of the setup and will reboot your system few
times.
11. After the reboot your computer will be prepared for first use.
12. At this stage you need to choose a user name and computer name. Click next
to continue.
13. Review your time and date settings. Select your time zone, correct the date
14. Windows will now finalize the settings for your computer and restart.
15. Finally you have the logon screen. Just type your password and press enter
2. Click Start -> Run -> type compmgmt.msc -> click OK.
In the console tree, click Disk Management. The Disk Management window appears.
Your disks and volumes appear in a graphical view and list view.
disk where you want to create the partition, and then click New Partition.
space on an extended partition where you want to create the logical drive, and
5. Click the type of partition that you want to create (Primary partition, Extended
6. Specify the size of the partition in the Partition size in MB box, and then click
Next.
7. If you want to format the partition, click Format this partition with the following
settings, and then complete the fields in the Format dialog box otherwise
8. Confirm that the options selected are correct, and then click Finish.
1. Open device manager click - Start Menu -> Control Panel -> System and
2. You will see all your hardware listed. You need to check if you have any
yellow exclamation marks next to the name of the devices this indicates that
"Browse my computer for driver software". If you have the driver CD or if the
software".
5. Window 7 will search and install the driver from the CD or you can locate the
driver manually.
6. Once you have removed all the yellow exclamation marks from the device
Configuration of Printer
1. Click the Start and then choose the Control Panel option.
2. The Control Panel window opens up. Click Device and Printer.
3. The Device and Printer window opens up with the list of all external devices
and printer.
7. Click Have Disk to install Printer Driver. Browse driver location and click Ok.
2. Click the Network and Internet category and then select Networking and
Sharing Center.
3. From the options on the left-hand side, select Change adapter settings.
4. Right-click on the icon for Wireless / Local Area Connection and click enable.
5. If you are going to Connect Wireless Network Then Right Click n The
Computer
(sometimes called the host computer) in a different location. For example, you can
connect to your work computer from your home computer and have access to all of
your programs, files, and network resources as though you were in front of your
computer at work
4. Select Allow connections only from computers running Remote Desktop with
5. Click on the Select Users button and add the users that you would like to
grant access to via Remote Desktop, click on the user and click OK when
done.
6. Click OK 3 times to exit all of the dialog boxes.
Connection.
1. Click on Start Button select All Programs > Accessories > Remote Desktop
Connection
2. Type the address of the remote computer in the Computer: text box, click
Connect
Windows 7
2. Open My Computer Right click on Drive or Folder which you want to share
with other.
6. Check the Box Share This Folder. Give The Share Name and Then Click on
Permission Button.
2. When prompted for an installation language and other regional options, make
4. Enter your Product ID in the next window, and if you want to automatically
5. Select the Full version of the right Windows version you're prompted, and click
Next.
6. Read and accept the license terms by clicking to select the checkbox and
pressing Next.
7. Select Custom (Advanced) installation option for New and Clean Window
Installation.
8. Next screen select the drive usually Disk 0, and click Next.
9. The installation now begins, copying the setup files from the DVD to the hard
drive, extracting and uncompressing the files after a while the operating
system is installed.
11. Then the server reboots you'll be prompted with the new Windows Server
13. The default Administrator is blank, so just type Administrator and press Enter.
14. You will be prompted to change the user's password. You have no choice but
to press Ok.
15. In the password changing dialog box, leave the default password blank and
Ok
16. Finally, the desktop appears and that's it, you're logged on and can begin
working.
A server role is a set of software programs that, when they are installed and properly
configured, lets a computer perform a specific function for multiple users or other
Active Directory Domain Services (AD DS) is a server role in Active Directory that
allows admins to manage and store information about resources from a network, as
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They
maintain a directory of domain names and translate them to Internet Protocol (IP)
addresses. This is necessary because, although domain names are easy for people
no matter what they are or what functions they perform. An application server can be
server or to access the Windows desktop from almost any computing device that
supports the RDP protocol. Users can connect to a terminal server to run programs
Enables the management of print servers and printers. A print server reduces
Domain Services?
2. Select Add Role and Then Select The Active Directory Domain Services from
List of Role
3. After this Click start > run and type dcpromo and press enter.
9. Set the Active directory restore password. It is not the same as your domain
administrator password.
12. During the installation process do not click cancel. The installation process will
Group Policy is simply the easiest way to reach out and configure computer and user
2. Click the + next to Active Directory Users and Computers, and click the
reskit.com domain.
2. Click the Security tab, then click the security group for which you want to allow
3. To provide administrative control of all aspects of the GPO, set the Read
4. Click OK.
2. Click on Start button and from the appeared menu click on Server Manager.
6. Right click anywhere in the center pane and from the appeared menu click on
New User.
7. On New User box populate that required fields with appropriate information
8. Once done, click on Create button to create the user with the specified name.
Computers.
2. In Active Directory Users and Computers, navigate to the folder where you
7. If the account will be used by a service application like SQL Server, uncheck
User must change password at next logon and check the options below.
Section C
Linux
Linux Installation
4. Next Using your mouse, select the language you would prefer to use for the
installation.
type (for example, U.S. English) for the keyboard you would prefer to use for
the installation and as the system default. Once you have made your
8. Next Select Installation Type, Choose the type of installation you would like to
and Upgrade.
9. Next Disk Partitioning Setup option will appear, Select Automatic partitioning
10. Next select the Boot Loader Configuration .In order to boot the system without
a boot diskette, you usually need to install a boot loader. A boot loader is the
11. Next Set the Network Configuration. If you do not have a network device, you
will not see this screen. The installation program will automatically detect any
network devices you have and display them in the Network Devices list. Once
you have selected a network device, click Edit. From the Edit Interface pop-up
screen, you can choose to configure the IP address and Net mask of the
device via DHCP (or manually if DHCP is not selected) and you can choose to
12. Next Set the Root Password. The root account is used to install packages,
14. Unless you choose a custom installation, the installation program will
15. Next screen preparing you for the installation of Red Hat Linux.
1. Select Applications (the main menu on the panel) => System Settings =>
2. You can also start the User Manager by typing redhat-config-users at a shell
prompt.
3. If you are not logged in as root, you will be prompted for your root password.
4. The window shown in Figure 1-16 will appear. Click Add User.
5. In the Create New User dialog box, enter a username and other Information.
6. Click OK. The new user will appear in the user list.
password.
7. At the New password: prompt enter a password for the new user and press
[Enter].
8. At the Retype new password: prompt, enter the same password to confirm
your selection.
Linux File System is a layer which is under the operating system that handles the
positioning of your data on the storage, without it the system cannot knows which file
Ext3: came from Ext2, but with upgrades and backward compatibility. This file
Ext4: faster and allow large files with significant speed. It is a very good option for
SSD disks and this one is the default file system that Linux suggests.
JFS: old file system made by IBM. It works very well with small and big files, but it
XFS: old file system and works slowly with small files.
mkdir Command:
Purpose: mkdir command is used for creating new directory (Folder). We also used
-m Assign Permission default 755 mean Read, Write and execute Access for owner
and Read and Execute Access for Other user and Group.
rmdir Command
This Command is used to delete the directory. Directory must be empty.
After typing this command delete the folder name toqeer and before deleting give the
confirmation message.
rm Command:
Purpose: This command used to delete the folder and files and also sub folder if
existing.
Where
–r means delete all the sub folder, -I means give message before deleting, -f mean
After typing this command and pressing Enter Key the folder Toqeer And All its files
ls Command
Purpose: This command displays the list of files and folder of the working directory.
-l display the long list means that all the information about files and folders.
-R in reverse order.
cat Command
Purpose: This command read the data form standard input and then out put in the
different forms. In simple word we say that CAT command is used for three different
purposes.
First to create a new file for this purpose we use cat command in this way
Second we create a file for an other file we use cat command in this way
Where source file is file from which we create a new file. And destination file is new
file name.
if we want to merge the file contents with an other file we use cat command in
this way:
With this command Contents of source file merge with contents of Destination file.
Cat command also display the Contents of file. For this purpose we use cat
After this type the contents of file and then press CTRL + D Key for save the file.
Cat Test.txt
This command Create a new file name new.txt and copy the contents of test.txt in to
new.txt
cp Command:
Purpose :This command copy the file form one location to other location or Copy the
cp test.txt new.txt
mv Command:
First Move the file or folder from one location to other location.
This command also used for Renaming the file and folders.
ln Command:
LINK_NAME is omitted, a link with the same base name as the TARGET is created
file Command: -
wc Command: -
Purpose: This command Count the Contents of file. For example total number of
-c Count the Total Character, -l Count The Total line, - W Count The total Word
Calendar Command: -
Syntax:
Before you can do the calendar program you must have a file named calendar at the
root of your profile. Within that file you may have something similar to:
Then add at the end of your .login or .profile calendar and then when you log on 7/7
Examples: calendar
Display appointments if any.
cal Command: -
Where month and year are optional if we type only CAL command then display the
current calendar.
After typing this command and pressing Enter Key Calendar of March 2006 is
passwd Command: -
chown Command: -
Purpose
Change the Owner of file, you can also specify the Privileges of the file same time
who Command: -
PURPOSE: This Command Display The list of those users who are Currently Login.
SYNTAX: Who [-s][-q][-h][-i]
Where -s means that Display the User ID, -H Column Header, -q Display quick
who am i Command: -
PURPOSE: -This tells that who ere you, Means That Log in Name of the user.
SYNTAX:- who am I
Tee Command: -
Where –a means that if file already exist then insert the data in previous file.
In the above example the ls command would list all .txt files in the current directory,
take a word count (wc) by the amount of lines (-l) and the output will be sent to the
count.txt.
Write Command:
Purpose: This command used to send the message to the other user right at the
same time when you type the message it will be send at real time message to the
online user whose name is specified in the command. In the end press CTRL+D or Z
Message
Press CTRL+D or Z
When You press Enter key this message Transmit to User01. For end of session
mesg Command : -
Lets you control if people can use the write command, to send text to you over the
screen.
Syntax: mesg [n | y]
Examples: mesg
Typing this command by itself will display whether or not the mesg service is
enabled. For example, it may display: "is y", indicating that it is enabled. Typing n or
Purpose
This command is used to display the message to all those users who are currently
logged on to the system. wall command is differ form write command because write
command send the message to specify users but wall command send the message
to all user.
CTRL+Z
Mail Command: -
This command is used to read/send E-Mail the mail to any user in Network. If User
currently not login then mail store in the mail box of that user. User can check this
mail at any time when he/she login by typing mail and press enter key.
SYNTAX: Mail User ID
Write text-------
-------
------
------
Press CTRL +D Key to save
Clear Command: -
SYNTAX: Clear
Vi Command:
This command is used to edit the file are create new file. Using Screen-oriented
pico Command: -
PURPOSE: This command is used for creating a new file are edit the previous store
file.
less Command: -
PURPOSE: This command Write The Contents of file on the screen. You can not
edit the file with this command. Jus like Type command in DOS.
tar Command: -
deluser Command: -
PURPOSE: This command deletes the user from Linux Server. Or Remove the
Login Name.
more Command: -
Purpose: The more command is used to display the contents of file page by page.
The more command pauses at the end of each page and by pressing Space Bar key
Where Line number is optional which specify the Starting Line Number.
- lines
Tail COmmand: -
Purpose: Display the contents of file from one specific point to an other specific
We say that
Syntax: Tail +Start Line number test.txt [+ End Line Number] File Name
The above example would list the last 10 (default) lines of the file myfile.txt.
The above example would list the last 100 lines in the file myfile.txt.
Head Command: -
Purpose: This command display the contents of file form top to Specific Number Of
line.
Normally this command Displays the first ten lines of a file, unless otherwise stated.
Finger Command: -
Purpose: Display the detail of Information of the user. If we specify the user name
then information about that user is display other wise information of all currently login
is display.
For Example: finger -b -p ch
at Command: -
late at night.
Syntax: at Time
Command
write
Shutdown Command: -
Purpose:
Syntax: Shutdown –g –y
Where –g give the 60 second to user save work and log out and –y means that
ps Command: -
Purpose: The ps command is used to provide information about the currently running
Syntax: Ps
For Example: ps
kill Command: -
This command stopped the running process in background or we say Cancels a job.
Exit Command: -
Allows you to exit from a program, shell or log you out of a Unix network.
Syntax: exit
Examples: exit - If supported would exit you from the program, shell or log you out
of network.
gzip Command
Compresses the file myfile, making it myfile.gz. Note. When doing this the original
Login Command: -
The man command which is short for manual provides in depth information about the
keyword.