OS Aasignment 01 Maria
OS Aasignment 01 Maria
Including;
The kernel, process management, memory management, file system management,
device management, and security and protection.
Discuss the types of kernels and their roles
How the OS handles process and memory management, the structure and types of file
systems, the interaction with hardware devices, and the mechanisms for ensuring
security and protecting resources.
Operating System:
An operating system is a critical component that manages hardware and software resources
on a computer, providing an interface between users, applications, and the hardware.
1. The Kernel:
The kernel is the core part of the OS, managing communication between hardware
and software.
Example: In Linux, the kernel manages CPU, memory, and peripheral devices like
keyboards and printers.
2. Process Management
Example: When you open multiple applications on Windows, the OS manages how
much CPU time each app gets using scheduling algorithms.
3. Memory Management
Example: When you open many browser tabs, the OS moves inactive tabs to disk
(virtual memory) to free up RAM.
The OS organizes and controls data storage in files and directories, managing access
and permissions.
Example: In Linux, the Ext4 file system organizes files into folders, and the OS
ensures only authorized users can access specific files.
5. Device Management
Example: When you plug in a USB drive, the OS detects it and mounts the drive,
allowing you to read/write files.
The OS ensures that unauthorized users or programs cannot access restricted data or
resources.
___________________________________________________________________________
1. Monolithic Kernel:
The entire OS (including device drivers, file system management, etc.) runs in a
single address space in kernel mode.
2. Microkernel:
3. Hybrid Kernel
________________________________________________________________
1. Process Management:
The OS manages multiple processes by scheduling them and allocating CPU time.
Example: In Windows, when you open a web browser and a text editor, the OS uses
process scheduling to give each app time to execute on the CPU without interfering
with the other. It uses algorithms like Round Robin to switch between them.
2. Memory Management:
The OS allocates and deallocates memory to processes and manages virtual memory
when physical RAM runs out.
Example: If you open multiple tabs in a browser, the OS might use virtual memory
(on disk) to store inactive tabs, freeing up RAM for active ones.
The OS organizes files on storage devices into structures (directories, files) and uses
different file system types to manage data.
Example: In Windows, the NTFS file system allows you to organize files into
folders, manage permissions, and ensure data integrity through journaling.
Simple and widely supported but lacks advanced features like journaling.
Known for data integrity, support for large storage pools, and built-in RAID.
4. Hardware Interaction:
The OS uses device drivers to communicate with and control hardware devices.
Example: When you connect a printer, the OS loads the printer driver so it can send
print jobs from applications like Word or Excel.
The OS ensures data security through user authentication, access control, and
encryption.
Example: In macOS, the OS uses FileVault to encrypt the hard drive, ensuring that
only authorized users can access the data. Access control manages which files a user
can read, write, or execute.
___________________________________________________________________________
Question#02
Including:
Batch, time-sharing, distributed, network, and real-time operating systems.
Provide examples of each type, explain their key characteristics, and discuss their
typical applications and advantages.
Operating systems (OS) can be classified based on their capabilities and how they
manage resources and interact with users.
Key Characteristics:
Examples:
IBM’s OS/360
Hercules (mainframe emulator)
Applications:
Used in environments where similar tasks are repeated regularly, such as payroll
systems, banking systems, or data processing centers.
Advantages:
Disadvantages:
Key Characteristics:
Applications:
Used in environments where multiple users need access to a single system, such as
academic or research institutions.
Supports online systems like transaction processing and data entry.
Advantages:
Disadvantages:
Key Characteristics:
Examples:
Applications:
Large-scale computing tasks like data processing, scientific simulations, and cloud
computing platforms (e.g., Amazon Web Services, Microsoft Azure).
Advantages:
Disadvantages:
Key Characteristics:
Examples:
Applications:
Ideal for client-server architectures where resources are managed by a central server
but accessed by clients.
Common in business networks, allowing resource sharing and collaboration.
Advantages:
Resource sharing: Centralized control allows efficient use of resources across the
network.
Improved security: Centralized management of user access and data.
Disadvantages:
Key Characteristics:
o Hard real-time systems: Guarantees tasks are completed within the required
deadlines (e.g., medical equipment).
o Soft real-time systems: Tasks are prioritized but missing a deadline
occasionally is acceptable (e.g., multimedia streaming).
Examples:
Applications:
Industrial control systems, air traffic control, medical devices, robotics, and
automobile systems e.g. control.
Advantages:
Disadvantages: