0% found this document useful (0 votes)
70 views

CHAPTER 2 Intro To Operating System

This document provides an overview of operating system environments and types of operating systems. It describes the main functions of an operating system including memory management, processor management, device management, file management, and other tasks like security and error detection. It then discusses different types of operating systems in more detail, including batch systems, time-sharing systems, distributed systems, network operating systems, and real-time operating systems. The advantages and disadvantages of each type are summarized.

Uploaded by

alex
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

CHAPTER 2 Intro To Operating System

This document provides an overview of operating system environments and types of operating systems. It describes the main functions of an operating system including memory management, processor management, device management, file management, and other tasks like security and error detection. It then discusses different types of operating systems in more detail, including batch systems, time-sharing systems, distributed systems, network operating systems, and real-time operating systems. The advantages and disadvantages of each type are summarized.

Uploaded by

alex
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Page 1 of 212

CHAPTER 2: INTRODUCTION TO OPERATING


SYSTEM ENVIRONMENT
Introduction to OS
An operating system is a program that acts as an interface between the user and the computer
hardware and controls the execution of all kinds of programs.

Function of Operating system


Following are some of important functions of an operating System.

 Memory Management
 Processor Management
 Device Management
 File Management
 Security
 Control over system performance
 Job accounting
 Error detecting aids
 Coordination between other software and users

Page 2 of 212
Memory Management
Memory management refers to management of Primary Memory or Main Memory. Main
memory is a large array of words or bytes where each word or byte has its own address.

Main memory provides a fast storage that can be accessed directly by the CPU. For a program to
be executed, it must in the main memory. An Operating System does the following activities for
memory management −

 Keeps tracks of primary memory, i.e., what part of it are in use by whom, what part are
not in use.
 In multiprogramming, the OS decides which process will get memory when and how
much.
 Allocates the memory when a process requests it to do so.
 De-allocates the memory when a process no longer needs it or has been terminated.

Processor Management
In multiprogramming environment, the OS decides which process gets the processor when and
for how much time. This function is called process scheduling. An Operating System does the
following activities for processor management −
 Keeps tracks of processor and status of process. The program responsible for this task is
known as traffic controller.
 Allocates the processor (CPU) to a process.
 De-allocates processor when a process is no longer required.

Device Management
An Operating System manages device communication via their respective drivers. It does the
following activities for device management −
 Keeps tracks of all devices. Program responsible for this task is known as the I/O
controller.
 Decides which process gets the device when and for how much time.
 Allocates the device in the efficient way.
 De-allocates devices.

File Management
A file system is normally organized into directories for easy navigation and usage. These
directories may contain files and other directions.
An Operating System does the following activities for file management −
 Keeps track of information, location, uses, status etc. The collective facilities are often
known as file system.
 Decides who gets the resources.
 Allocates the resources.
 De-allocates the resources.

Page 3 of 212
Other Important Activities
Following are some of the important activities that an Operating System performs −

 Security − By means of password and similar other techniques, it prevents unauthorized


access to programs and data.
 Control over system performance − Recording delays between request for a service and
response from the system.
 Job accounting − Keeping track of time and resources used by various jobs and users.
 Error detecting aids − Production of dumps, traces, error messages, and other
debugging and error detecting aids.
 Coordination between other softwares and users − Coordination and assignment of
compilers, interpreters, assemblers and other software to the various users of the
computer systems.

Types of Operating System


Operating systems are there from the very first computer generation and they keep evolving with
time. In this chapter, we will discuss some of the important types of operating systems which are
most commonly used.

Batch operating system


The users of a batch operating system do not interact with the computer directly. Each user
prepares his job on an off-line device like punch cards and submits it to the computer operator.
To speed up processing, jobs with similar needs are batched together and run as a group. The
programmers leave their programs with the operator and the operator then sorts the programs
with similar requirements into batches.

The problems with Batch Systems are as follows −

 Lack of interaction between the user and the job.


 CPU is often idle, because the speed of the mechanical I/O devices is slower than the CPU.
 Difficult to provide the desired priority.

Time-sharing operating systems


Time-sharing is a technique which enables many people, located at various terminals, to use a
particular computer system at the same time. Time-sharing or multitasking is a logical extension
of multiprogramming. Processor's time which is shared among multiple users simultaneously is
termed as time-sharing.

The main difference between Multiprogrammed Batch Systems and Time-Sharing Systems is
that in case of Multiprogrammed batch systems, the objective is to maximize processor use,
whereas in Time-Sharing Systems, the objective is to minimize response time.

Multiple jobs are executed by the CPU by switching between them, but the switches occur so
frequently. Thus, the user can receive an immediate response. For example, in a transaction
processing, the processor executes each user program in a short burst or quantum of

Page 4 of 212
computation. That is, if n users are present, then each user can get a time quantum. When the
user submits the command, the response time is in few seconds at most.

The operating system uses CPU scheduling and multiprogramming to provide each user with a
small portion of a time. Computer systems that were designed primarily as batch systems have
been modified to time-sharing systems.

Advantages of Timesharing operating systems are as follows −

 Provides the advantage of quick response.


 Avoids duplication of software.
 Reduces CPU idle time.

Disadvantages of Time-sharing operating systems are as follows −

 Problem of reliability.
 Question of security and integrity of user programs and data.
 Problem of data communication.

Distributed operating System


Distributed systems use multiple central processors to serve multiple real-time applications and
multiple users. Data processing jobs are distributed among the processors accordingly.

The processors communicate with one another through various communication lines (such as
high-speed buses or telephone lines). These are referred as loosely coupled systems or
distributed systems. Processors in a distributed system may vary in size and function. These
processors are referred as sites, nodes, computers, and so on.

The advantages of distributed systems are as follows −

 With resource sharing facility, a user at one site may be able to use the resources available at
another.
 Speedup the exchange of data with one another via electronic mail.
 If one site fails in a distributed system, the remaining sites can potentially continue operating.
 Better service to the customers.
 Reduction of the load on the host computer.
 Reduction of delays in data processing.

Network operating System


A Network Operating System runs on a server and provides the server the capability to manage
data, users, groups, security, applications, and other networking functions. The primary purpose
of the network operating system is to allow shared file and printer access among multiple
computers in a network, typically a local area network (LAN), a private network or to other
networks.

Page 5 of 212
Examples of network operating systems include Microsoft Windows Server 2003, Microsoft
Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD.

The advantages of network operating systems are as follows −

 Centralized servers are highly stable.


 Security is server managed.
 Upgrades to new technologies and hardware can be easily integrated into the system.
 Remote access to servers is possible from different locations and types of systems.

The disadvantages of network operating systems are as follows −

 High cost of buying and running a server.


 Dependency on a central location for most operations.
 Regular maintenance and updates are required.

Real Time operating System


A real-time system is defined as a data processing system in which the time interval required to
process and respond to inputs is so small that it controls the environment. The time taken by the
system to respond to an input and display of required updated information is termed as the
response time. So in this method, the response time is very less as compared to online
processing.

Real-time systems are used when there are rigid time requirements on the operation of a
processor or the flow of data and real-time systems can be used as a control device in a dedicated
application. A real-time operating system must have well-defined, fixed time constraints,
otherwise the system will fail. For example, Scientific experiments, medical imaging systems,
industrial control systems, weapon systems, robots, air traffic control systems, etc.

There are two types of real-time operating systems.

Hard real-time systems


Hard real-time systems guarantee that critical tasks complete on time. In hard real-time systems,
secondary storage is limited or missing and the data is stored in ROM. In these systems, virtual
memory is almost never found.

Soft real-time systems


Soft real-time systems are less restrictive. A critical real-time task gets priority over other tasks
and retains the priority until it completes. Soft real-time systems have limited utility than hard
real-time systems. For example, multimedia, virtual reality, Advanced Scientific Projects like
undersea exploration and planetary rovers, etc.

Page 6 of 212
Use of operating systems command
There are many different operating systems. Each do the same thing: they control all input, processing
and output. Click on the links to see examples of the desktop for the operating systems listed. These
examples open in their own window. Click the X in the upper-right corner of the window to return to this
page.

 DOS - Disk Operating System - one of the first operating systems for the personal computer.
When you turned the computer on all you saw was the command prompt which looked like c:\ >.
You had to type all commands at the command prompt which might look like c:\>wp\wp.exe.
This is called a command-line interface.
It was not very "user friendly"
 Windows - The Windows operating system, a product of Microsoft, is a GUI (graphical user
interface) operating system. This type of "user friendly" operating system is said to have WIMP
features:
o Windows
o Icons
o Menus
o Pointing device (mouse)
 MacOS - Macintosh, a product of Apple, has its own operating system with a GUI and WIMP
features.
 Unix - Linux (the PC version of Unix) - Unix and Linux were originally created with a command-
line interface, but recently have added GUI enhancements.

*user-friendly is a relative term. The current GUI interfaces provided by Windows and Mac operating
systems are more friendly than the previous DOS systems, but still require us to conform to their
specifications (use of a keyboard or mouse instead of voice and/or hand-writing recognition).

Operating Systems - MS-DOS - Commands


DOS commands are the commands available in MS-DOS that are used to interact with the
operating system and other command line based software.

Accessing DOS interface: on start button, type CMD(short for Command) to open the DOS
command interface

Command Description
dir lists the contents of a folder
cd changes folder
cd .. parent folder
md or mkdir creates a new folder
deltree deletes a folder and all sub-folders
copy, xcopy copies a file
move moves a file
del deletes a file
type displays the contents of a file
type |more displays file contents page by page, pausing after each page

Page 7 of 212
help help for the given command
print prints the given file
attrib (-/+r, -/+a, -/+s, changes a file's attributes (- deactivates, + activates, r: read-only, a:
-/+h) archive, s: systeme, h: hidden file)
format formats the given drive
label assigns a drive name to a drive
ver gives the version number

DOS Internal and External Commands


Command is an instruction written in a computer acceptable language that user types on the dos
prompt. It will execute and do the appropriate action. There are mainly two types of dos
command.

 Internal commands
 External commands

1. Internal commands: The internal commands are those commands that are automatically
loaded in the memory. Some commonly used DOS internal commands are

1 Cls 6. Copycon 11. CD


2. Dir 7. Type 12. RD
3. Date 8. Ren 13. Copy
4. Time 9. Del
5. Ver 10. MD

1) Cls :- The purpose of this command is to clear the display screen and redisplay the Dos
prompt at the top left corner of the screen.

Syntax:- C : / > Cls

2) Dir:- It displays the list of directories and files on the screen.

Syntax:- C : / > dir.

a. C : / > dir/p – It displays the list of directories or files page wise

b. C: / > dir/w- It displays the list of directories or files width wise

Page 8 of 212
c. C : / > dir/d: –It display list of directories or files in drive D

d. C : / > dir filename . extension – It displays the information of specified file.

e. C : / > dir file name with wild cards.

2. Wild cards: - It is the set of special characters wild are used with some commonly used DOS
commands there are two types of wild cards.

1. Asterisk (*)

2. Question mark (?)

1. Asterisk:- (*) The wild word will match all characters.

1. C : / > dir *.* - will display list of all files and directories.

2. C : / > dir R*.* - will display all files stored with first character R.

2. Question mark: - This wild card represents a single character that a group or files have in
common.

1) C : / > dir ac .* - will display all files having any first character and remaining name has given in
command.

2) C : / > dir ??? R . doc-will display all files having extension doc and having any first three letters
and fourth letter is R.

3) Date: - It displays the current system date. User can also change the current date with new date
by using this command.

Syntax: - C : /> date

Current date is: sat 3-25-2015

Enter of new date (mm-dd-yy):-

4. Time : - It displays the current systems time user can also change existing time with new time by
using this command.

Syntax : - C : / > time

Current time is 12 : 39 - 48 : 36 p

Page 9 of 212
Enter new time : -

5. VER : It displays the version of DOS being used currently.

Syntax : - C : / > Ver

MS – Dos version 6 : 20

Copy card .

6. copycon : - The purpose of this command is to create a file.

Syntax : - C : / > copy con filename . extension

Saves the contents of file by pressing ctrl +z key combination at the last time of the file. File name
should not be greater than 11 characters out of which 8 characters are for the name and 3 characters
are for the extension.

Extension is optional :

Eg : C : / > copy con ram

I am a good boy

1. File is copied.

C:/>

7. TYPE:- Allows the user to see the contents of a file.

Syntax :- C :/ >Type path

Eg: C:/ > Type D:/> ramu

8. REN : - The purpose of this command is to rename the old file name with new file name.

Syntax : - C : / > ren oldfilename newfilename

C : / > ren ramu somu

9. DEL:- The purpose of this command is to delete file. The user can also delete multiple files by
busing this command and long with while cards.

Page 10 of 212
Syntax : - C : / > Del file name . extension

C : / > Del ramu

C : Del x . prg.

10. MD:- The purpose of this command is to create a new directly or sub directly i.e sub
ordinate to the currently logged directly.

Syntax : - C : /> MD directory

C : /> MD sub directory

Ex : C : / > MD college

Now user wants to create a sub directory first year in college directory then

C : / > cd college

C : / > college > Md first year

11. CD : - The purpose of this command is to change from one director to another directory or
sub – directory.

Syntax : - C : / > CD directory name

Ex : C: / > cd college

C : / > college > CD first year

C : / > college > first year >

If the user wants to move to the parents directory then use CD command as

C : / > college > first year > cd ….

C : / > college >

12 . RD: - The purpose of this command is to remove a directory or sub directory. If the user
wants to remove a directory or sub – directory then first delete all the files in the sub – directory
and then remove sub directory and remove empty main directory.

Page 11 of 212
13. COPY: The purpose of this command is to copy one or more specified files to another disk
with same file name or with different file name.

Syntax : - C : / > copy source path target path

C : / > copy A :/>  *. *  C : /> chinni

2. External commands: - This commands are not permanent part of the memory. To execute or
run this commands an external file is required.

Example : [.] Dot exe, bat.

Some commonly used DOS external commands are .

1. CHKDSK:- The command CHSDK returns the configuration status of the selected disk. It returns
the information about the volume, serial number, total disk space, space in directories, space in each
allocation unit, total memory and free memory.

Syntax : - C : / > CHKDSK drive name

Eg:- C : / > CHKDSK e :

If drive name is not mentioned by default current drive is considered.

2. Diskcopy : - Disk copy command is used to make duplicate copy of the disk like Xerox copy. It
first formats the target disk and then copies the files by collection. From the source disk and copied to
the target disk.

Syntax : - C : / > disk copy < source path > < destination path >

Ex: - c : / > diskcopy A : B :

NOTE: - This command is used after diskcopy command to ensure that disk is copied successfully.

3. Format : - Format is used to erase information off of a computer diskette or fixed drive.

Syntax : - C : / > format drive name

Ex : C : / > format A:

4. Label : This command is used to see volume label and to change volume label.

Page 12 of 212
Syntax : C : / > label drive name

Ex : C : / > label A:

5.Scandisk : - This utility is used to repair and check various disk errors. It also
defects variousphysical disk errors and surface errors.

Syntax : - C : / > scandisk <

drive names >C : / >

Scandisk A :

6. Move : The purpose of move is move to files from one place to another place.

Syntax: C : / > Move < source path > < target path >

7. Print :This command allowed users to print a text file to a line printer.

Syntax : C : / >

Print < files name >

C : / > print ramu

8. Tree : This command displays the list of directories and files on specified path
using graphicaldisplay. It displays directories of files like a tree.

Syntax:- C

: / > tree >

pathC : / >

tree A:

9. Deltree: This command is used to delete files a directories same as by the del
and RD commands. This command is more useful than del and RD commands
because it completely removes specified directories ie., disk will all it files and sub –
directories at a time.

Syntax:- C : /

Page 13 of 212
> deltree

(path) C : / >

deltree

A:/>ramu

Page 14 of 212

You might also like