Operating System
Operating System
System
STUDENT’S NAME
Daniyal Aqil BSCS
193 (E) 5TH Semester
Submitted to;
Arslan Tariq
Activity 1
2
REPORT TITLE
The 1980s witnessed a transformative shift with the introduction of GUI-
based operating systems. Apple's Macintosh System Software and Microsoft's
Windows 1.0 were instrumental in popularizing the use of graphical
interfaces, enabling users to interact with computers through icons, windows,
and a mouse-driven interface.
3
REPORT TITLE
operating system is a necessity for any computer, be it a video game console,
a desktop or laptop, or a smartphone.
Programs that run and carry out tasks, such as browsers, notepads, Microsoft
Office, games, etc., require an environment. The operating system facilitates
communication between you and the computer. Without an operating system,
no computer or mobile device can function.
According to this, the operating system has developed over time and has turned
into a very useful tool. You do not notice it because it is universal and common; it
just functions. Your computer's and laptops' operating system is the fundamental
component that powers your everyday existence.
The operating system (OS) can be found everywhere: in cars, in smart devices, and
even in your mobile phones.
Due to the widespread use of technology, everyone has become familiar with the
most common operating system (OS): macros, also known as Windows.
Despite having distinctively different functions, these operating systems offer
largely comparable services to their users. In light of this, spending some time
learning about the significance of an operating system can help guarantee that you
have the knowledge necessary to select the ideal computer for your requirements.
An operating system controls almost every element of the user experience at its
most basic level. The operating system (OS) is essential to the operation of your
computer from the first second you turn it on to the very last second before it shuts
down.
Activity 2
4
REPORT TITLE
c) Job scheduling capabilities (Algorithms and
Security)
d) File management (Algorithms and Security)
Process Management:
Algorithms:
Operating systems employ various algorithms for process management, including
the creation, execution, and termination of processes. Notable algorithms include
First-Come, First-Served (FCFS), Shortest Job Next (SJN), and Round Robin, each
catering to specific priorities and requirements. Additionally, preemptive and non-
preemptive scheduling algorithms such as Priority Scheduling and Multilevel
Queue Scheduling are utilized to optimize the utilization of CPU resources.
Security:
Process isolation and protection mechanisms are integral to the security of the
system. OS implements techniques such as process permissions, memory
protection, and access control lists to ensure that processes operate within
designated boundaries, preventing unauthorized access and interference between
processes.
Algorithms:
Memory management in operating systems involves the allocation and deallocation
of memory space for processes and data. Key algorithms include Paging,
Segmentation, and Virtual Memory, which enable efficient memory allocation,
addressing fragmentation issues, and maximizing the utilization of available
memory resources.
5
REPORT TITLE
Security:
Memory protection mechanisms are crucial in preventing unauthorized access and
manipulation of memory content. Techniques such as address space layout
randomization (ASLR), data execution prevention (DEP), and memory protection
keys are implemented to safeguard sensitive data and prevent malicious attacks that
exploit vulnerabilities within the memory space.
Algorithms:
Job scheduling algorithms are pivotal in determining the order and priority of tasks
to be executed. Operating systems utilize algorithms like First-Come, First-Served
(FCFS), Shortest Job Next (SJN), and Priority Scheduling to optimize job
execution, minimize response times, and ensure fair resource allocation for different
processes.
Security:
Job scheduling security involves ensuring that critical tasks are executed securely
and efficiently. The implementation of access controls, authentication protocols,
and secure communication channels helps in safeguarding sensitive job data and
preventing unauthorized access or tampering during job execution.
d) File Management:
*Algorithms:
Operating systems utilize various file management algorithms, such as File
Allocation Table (FAT), Indexed Allocation, and Linked Allocation, to organize
and manage file storage efficiently. These algorithms facilitate file creation,
deletion, and retrieval, ensuring data integrity and efficient access to stored
information.
Security:
File management security mechanisms involve access control and encryption to
protect sensitive data from unauthorized access and manipulation. Techniques like
access control lists (ACLs), file permissions, and encryption protocols are
employed to ensure the confidentiality, integrity, and availability of data stored
within the file system.
6
REPORT TITLE
Activity 3
Critical Evaluation:
1. Process Scheduling:
The operating system employs various scheduling algorithms (such as First-
Come-First-Serve, Shortest Job Next, Round Robin, etc.) to determine the
order in which processes should be executed. This helps in maximizing CPU
utilization and ensuring fair allocation of resources to different processes.
2. Memory Management:
7
REPORT TITLE
3. File Management:
The OS manages files on storage devices, ensuring data integrity and efficient
access. This involves organizing data into files, directories, and maintaining
file access permissions. File management also includes handling file system
structures, such as allocation methods (like FAT, NTFS, or EXT4) and
managing disk space allocation.
4. Device Management:
The OS controls the interaction between peripheral devices and the computer
system. It handles device drivers, which act as intermediaries between hardware
devices and the OS, enabling communication and data transfer. Techniques like
buffering and spooling ensure efficient device management, preventing
bottlenecks and improving overall system performance.
Diagram:
+------------------------------------+
| Operating System |
+------------------------------------+
| Process Management |
| Memory Management |
| File Management |
| Device Management |
+------------------------------------+
8
REPORT TITLE
The diagram demonstrates that the operating system serves as a central entity
overseeing various resource management functions, including process, memory,
file, and device management. These components work in tandem to ensure efficient
resource allocation and utilization, thereby enabling the smooth functioning of the
overall system.
9
REPORT TITLE
10
REPORT TITLE