OS HA3 OS HA4 Merged Compressed
OS HA3 OS HA4 Merged Compressed
Aobocol
A Protocol iS a set of rules and Conventions that define
bow dota it
Lyansmitted and Yeceived overa netork: lE acts a Communication
Quideiine ensuring that devices Canunderstand ad inter pret the
ineomation being echanged Protocos overn Verious aspects of neburrs
(oMmunication, inuding daba format eror handingnd security
Measures
J-Aotection
- Real time Cou scheduers ensuve that Processer are
isoloted
Bromeochoother, Preventing interfevence and ersring ttat
Yeaj-time bask is not disuPted by lower- Priority talks- ahigh-pronty
Relource allocation - Protect ion mechanis ms ensure that Yeal-
-time tas:
eceive he neceSary CA time to meet their ceodines. They
Youti me Proceses From bein9 Stavved oY delayed eIcersveIy b
protet
non-rea time YoÇeres.
9-security.
control SeCurity measurer limit acerr to Ye.
Acerr
Parameters, ensuring that ony authorized Users to
time schedu niog
Cribcay scheduing Settings. unauthorized Proceres Can mi
the timing Yuirement OP rea -tinme task.changes Cou'd dSrupE
3.CouaboYaticg
RAFS enhances oloboration by enabing muukiple sexS to accecs and e2
shaved pies simuboneously tsuPPorts reay-time Colaboration all owing
teoms ko LwoTK ondocurents SPrecdsheets, and other Biies bosether PaSkenn
Productivity and teamwork
U-DataSecurity
RAES ORten incorforates robWt security
meares Such as encyion,
arcess renrolS.and autherntication Protocols This
ensures that Piles areacered
ooy by authorised users, enhancing data Security and
Prevenbing unautha
acess ortampering
G ScAlabiity
DOES SYcem can Sccule Casiy to accoMocate groing data
Stongered
Rsthe volume of. data increases, additionnu storage
CaPacity Ccn be ted to
Ehe Yenote Senvers uithat sig07eicant
Yemoins ereicient ad resfnsive.
diguptionS,ensuri 09 the stem
4- Erplainin delais about roie of Auttenticat ion-Autterízotion ond
Auditing in oS oith resPeck to Security
1- Authe nticakion
LOnle- Authenticakien if the Process oP verißyim he identiey of
user SYSkemor aopicat ion.
Fuction- It enSures bhat individuals oY entikíes
AYe who they Clain bo be (ommon
alceSSing thester
melkhods (ncde Passords.
biometrics ord mutiPockor -authenicatio0
k imfortance: Proper
authertiakion Proyents unauthoi zed accers, ensfita
on1y 1e9itimate Wers can log in
and use system
yeSburces
2:Autroiation
*Role-Authoriation Polous authentication and determiner the
Permi ioof and Privi tages
gYanked to authenticated uers orstem.
¥ unction- lt
SpeciPies ohat acticn useYs or Protecser ealo Wed to
Perform. deßining ascess leves boPies,
Systen Runctions
* \mortance - Autheri
divectories.netwok reources-d
2ation ensures that
Qcces resources and PerPorm authenticated useYs Can ony
actions aPPrcPriate Por their rOleS-
Urauthorized activitíes and data brexhes Preventing
3. Auditing
*
Role-Auditing involves tYacking and recording evens nd
he os activities wthin
Function- (t monitors Ser PcBlons,sstem Proesses
Ud
events, cYeating on audit rail Por
reiew and anuri seity-related
* \Mortonce-
Audting heies in idertifyig SeCurity
USeractivities ad ensuri ng comPiance with securityincidens,track ngan
foicies. t enab lec
the deteetion n£ unau
thorized acess attemts nd
cota Por forentic onalsis in Rovdes aluable
Case of security breaches
Otxpain in detaus about YOLE. ol Con Pidentiality, integity and
aVaitabiity in os to security.
|: Confidentiality
) Role- Confidentiarity ensures Ehat sensitive data is
Protec ted Brorm
un authoi7ed acess or disciasure
*Fucion-lt involves encrypting data, imelementing atcess (onkrole
and secuing Communication Channes ko Prevent unauthorried useys
rom accesing ConPidentia infornation
* IMPortance -Conei
dentiaiby SaleguaYds Sersitive data, uchas
infornralton or trade Seres. Brom being Perht.
unauthorized Paries, ensring Privacy andaccered orstolen by
compilace withregwations.
* Role- (nkegrnty ensues that dataromauns accurate
trustuortby durig storage Processing ard uraltered, and
*Function- TehniAues like cherksum digitautransmission.
mechanSms are used to Prerenk nauthoie SiINakures and acceSr Contrai
* ImPortance- 1ntegrity modipication of data.
guYantees that datais reliabieand har
Less hmPered tpith, lthees in
Ce inormation maintaing Ehe ConsiStency cund reliabiit
Pentig unut hoied or maliious Chargee.
3-Avaiabiity.
oAeiabiitY ensures that data are acessible and abi e byauthoe
Users when neeed.
kFunction- Redundoancy kskuPs,\Oad buiding balanig,
and disaster
Yotevery Planning reemloyed to minimi2e doumtime und ensurp,
System avai labiity Coninusw
Importance- Avaítabiity ensurer that USers
usoy Cn
accesr resouYCes at
(evvices withoutinterruetio n- kis
cucial for bsines continuity,
Prductivy and user Satisfaction.
FPlainin detal Yole of virtuau memory in RoTS 2
|1
memory in 0-s
Role of irtual
|-Add eSSPace
9 meOry isoation
AYtual memog rovides memory isolatior betueen Procesres. eosh
ocesses beieves tE boe
has Ehe entiro memoy toitseP Presenting
one arPiCation Prom aeess ing oY Modipying aother'sdota,erheseing
security and stabitity.
by3-mernory Masa9erent
Virbua! memorY enables Oeicient
jt Otiises RAM LSage by
management oPsstem rernory.
movig rarey accersed data bosloueY
<korage devies and Oading data back into RA
we needed.This
ProcessKnown as Pagin9 oY SaPPing, ensres that the
used data resides in Past
-access mostereuertu
4- fase of memorgimproving System feforman r
fregramming
Program mers Can deelop alPiications withat
with the Phyi( (imibakions oP
Conierning thenseves
RAMVirtua mery Smpifec
memory management Por Softue devel cfe
on oreating Yobst and allang them toocut
Peature -roch aePi katiens.
5 muititasking SuPAort
Virtual memory Ports
.tovun Concurrently Multitaskig by anowing mueiPle apeication
3 Epai in deta! about Pile Protection mechanims in Yeau time
0-S
Fe Potection mechanim in reau-time os are desi9ned toencure, Hho
Inkegrity ad Conidentiaity o fites while aintaining Yer-ti
PoYformarne
|Acess ContYol iSts
Acu degine which users or Pre
Ceres have access to SAecipic Rlesond
wtat operations (Yead aunite
Q1eute Ehey Can Aerform.
ImpleMentation
AcLs aYe asociated wih each
OY user qroups Rros ie,speifying aucued actions Ror users
enPoes Ehese Rermissiens
unauthoried aces Yi9orousiy to prevent
-Energption
* Roe
Enryption converts kite contents into a unreadobie
the Pro PeY decryetion key. Pormatuwithout
1mPIenentalion
RTOS Can empioy enYPtion agorith
bo Secure fies, ensuring that
Denie uauthored ser aCcess the ie, they Cannot understand
iks content wibhaut Ehe decryPion keu.
Donl-kime. Systems oten have serct Eiming reirementr -Access fot ies
Must desig ned (onsidenim these constraints to avoid
latency.
k\mPiementatíon)
ene acerS methods ald Secunty Chec ks are optimi zed for eu-ine
YosRonsivenesensuring Ehat aces Controi doesn't inkroduce
c'qnificont delays in Yitiay oferationt.
Yo1e of shared name SPace oith the hep of tuoo
in deta
Poesses in os
Shred Names Pace in Os alows mutipe Procecses to acrer sherod
-sbaved Resorces
Roje
Shaved namespace anous both Process Ato Process g to acces the sarre
(otof fies, divectoris oY Communication Chames.
3Inter-Process Communicabon
y-Resourte EPPiciency
Serations
*\ocKing- hen a thread wants to accers ashared resouce,it bres
to acquwYe the mulez, (e the mute is not
Cunently locked
Dy another bread the reuesting thead
sucessuy acaujrerthe
mutex and Can Praeed.
Xuniocking -when atread Pnishes using the shoYed resure, it
Yeleaos the mues,allouing
otherwajting ecds to aCauireit.
* muteXes aye suitabie PoY Scenanios uhere acrtta setion of Code
needs to te Protected,enuri ng that Ony one
thread executes the
(mtica secHon atatime.
Semapheves- Asemaphore is asynchroniation Primitive that
Can beed
Complea Coordinabion bly multiPle treodt or
Pro(ecses.
Oferatis
kuait oPeration-P the Semaphove Vaue is 9reater that O,
Ghe vaue and con tnue decvenyent
signau oferotion-
)-1ntrement Ehe emaPhores vaue: Ie
wating due to the senaphoYe bein9o, wake up 0ne
there are threads
f the
Lhveods luiing
USage- SemaphoYes are usek when yau need to
Corntro acec koo
vo Courco based on a certain condition
.notJutQuNNe occere
in detait about Process and Ehread
Pocess- A Proces and Ehreods are
Pundamental (onteotS in
CormArte Scienee and Oerating Syterns
characterisbcs.
1lSolation.- Each raess Yuns
ndeerdeny o other Proesses.
They Canot divecty access each others menory 0Y reouo:
withaut Wing inter Process
Advantages Communication mechonisns
*1solakion- Processes ave isolated Prom each
Gtem stabitiby cd Security otheerhantig
disadvantages.
ANOY heod- Creating and
ytom resources MoKing the
managig Pro(esses require SignEicant
to brecds
relatvey heavyweight inComfarisice
Thread- A threod is the
Sraiest unitoacprs
breads can 1ist ithin a Sing|eProcess. aeutorn mwbpe
Characeristic
Shared
resarces-Thyeads
Memor sPace and rerouYces
withio thesame Process share te ame
Adonloges
*PFiCieny. ThreadS arenmore efeicient than
li9htuwezo ht nature Preees ue to their
Disodvantages
* Synchronizatinco
MPlexity Since threds share the same
SFuce, develofers DRed memery
to avo id cata boimfement PrOAer ynchrunizakion medanisms
incons!stentles.
y- usig mutees and
Semaphores.
Eplaun in detail atabo ut data itegrity ad roteeton.
Data intigriy
Data inigrity refers to te acwacy and reiabiity odata througa
its ieecyIe
methods
|Checkium and Hach Funckiong- Checksums and CryPtographic hash
Punctions Jenerate uniue alues (checkSums oY hasher) bakd on the
data's content
1.Dì9italsigatures-DigitauSatures- Provideaway toverey tte
autentiity nd 10tegity of digitul Messages or dacymentt.
3Eroy detection and coection (o des-These Codes aYe acded to dat
unng Ermissio and storage
Data Probeckib n
mto prdeckion nVoves iMPlementing meare to Secure hto
unauthri zed occes disciesre, alteration -or destrurtion:
mothods
|- EncryPtion- Encryetion toSforns data intoan unreodabe Pav
usig enyption alori th ms and keys.
9.ACCes (ontro- Acces Control mechniims, Such s authentkationood
authoration,ensure that only authomzed usexscan acer Skeificdan
actions
or Perform certajn
Regular Auditing and monitorig- Continuous Moniboring and realar
audits heies detect nd g YeSpect and vesfnd to unauthori 2al
alcess YSuspiious activites PromPtiy
Aditing and Monitoring-
Contnamaitoitg
and
Loodotect and Tetond to unauthoried andit can be vegular
ror
audi
the event of accidentau devetlon, Cowuption ôr otber d
sarters
jn detaj abut Monitors cnd MUTEX Lk
Monitors
AMonitor is ahighever synehrenizatfon Construt that entafutaabes
Shaved data aand the oPerations Uat Can Performedon thqt data.
characteratis
(-EnaPulation. Monitor encopsulate data ond the oReatrs that
manUlate that data toith in aSngie onstruct.
2-mutuar EcIusia-monitos Prauide Mutuauescusion by
on 1y one thread to eetute Monitor atatime
altoung
Usage
*Java ln Java, the 'ynconhedkeywod is used toCreate rronibors
methods orcode bicks mavked as synch ronized ensure that ony
threod
(on execute them at a tie.
Muteiloks.
A mutex 1S
aychrenization Primitve that ensures oniy onéhrad can
acces ashared resorte or Cribicausection at atine.
choncteristis
Binarystate- A mubes is in one of to
when a read acaries be muex,t states:
iocked oY UNIOcKe
becomes lCKed.
-0wnerhie. A muben can be ouoned by the thred that
locKed Sonemule
Inperentatlons atlaw reeusive locking.
Usuge
*
uindous APl-on widou muterer are
like
crealerutey'. implesented usig AnCtions
waitforsingle.o kyeeko and ReQremutey 0',
EAain in detai aout dead tock hancing and reccvery melhods.
ead ik handigand Yecovery ethods
doad lloCkS OCuY in a muti-PrCeSs SStem uhen tuo br mo\e
Protesescann
Proxeed be cause they are aiting for each other to Yelease resource
|-Preventon
KeSource, AlloCattn Gvaph- Areorce aIocation raphis ued to detert
and Prevenk deid(otKS
ComPonents
*locK stale indiates oheather the
lock is iocKed OY
(onditoo Voriabes WIOcked-
*Condition variables axe
syrchonization Primtives that aouo thYea to
wat poY a speific Condi tion to
be true
before Proe Qoling-
*woitThYeods Can wnt onaodition
Variable ntil nother thread
S9rats oY broadasts that tre
Condi tion )s met.
BPering
& pe£inition- BufPering nvoves ternporarily StYing chta ina buft
lbhilet's being transfewed betwen different ComPonens or
daicas
jn acom puter NStem.
BesteikThe
Bestt alocaton ugorithm, The os alocates the
Smalest
Vayiabie block of memoy Ehat is alae enough to acoModate
the rocess
sostit
Io the wosPit aulaation algori thn, The cs alocates the largest
satet
Variab1e brock of memory. This apPrch caan Yewt the
highet
of Pramenkakio behind the largest unsed enorybiake.
14xPajn in detai abt Interfrecess Communicatio n
Interprocers Conmunication efevs tothe mechanisms and
techniue tat alos diPPerent PrOCeses in an os or dstrtbuted
Sstem bo eichange data and synchronne Hheir archieve
to isssertu For Varios Proces Such a
CoOPortie blo
Proess ata shoani n9 and Coodination The Ye are
eYaJ methds an mechanisSms Por TC
nCHin9,PPes
PrPes
Mesoge leve,storeed nemóry,
Efain Sleepin9 Barber Problen
he SleePi g Carber Probiem iS oaclacse Synchroniaton to
Conturent acceed and soIver the seeping Borker PYoblern
typicany involve uing synchrani Zation PrinciPie ike Condition
bles and Concphorer
oncphrer to Coordi rcte ho actorns of bovbes
Quake when Customer amive and custamer uos when ow are