0% found this document useful (0 votes)
20 views47 pages

Osy 1ST Unit

Operating Systems (22516) unit no 1 notes .

Uploaded by

bobbyathinkson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
20 views47 pages

Osy 1ST Unit

Operating Systems (22516) unit no 1 notes .

Uploaded by

bobbyathinkson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 47
DATE Page No. jf SUBJECT 4 oe “unit-1 Oueomes LD Sxelain. the_fundrening | [ = Sa given component of |_| , OPera oq eeplain chayattertstt(e_ at the given type of system. SIGN. Remark Taentify type of 0 een a ae sel execute Command Sat _ Comer ine for an 7 _ given erdee \\\ ONL T 4 olery)< © af opeocthing System foO Toy Operation an 4 o ~ofeecling . suskem ad ag. 00 _ he user _o ieee WwW beg? 4 “es and the tomputer _ha7l)ware. 2 @ TO deck apelicukinn fm one Another @ _ 3) How) fo Provide tfictent access fo resources - rate. onl] varius Llo “Teuice : : city Anel THs Goals - athe Security misuse of system can be ClassiHed as -Puscease ft) , Tet im Cusy bo aa dental migAse ae eedagatetis modliciou S test misuse. o=—The Syotem (8 geécure fF tks Se are usec and > acces se ol das pimposed under al « Total Security fs-impoocible to declajewe > The challenges in _dewloping operalin System Securxity ig to dest Gn security mechanism that sabeq unr Process exerubon tind thoir generated Aotd with omplex -taterarhons, : only suffcten} protection. system 15 mot enough for totcu eect ; Protection — mechanism refer to 0 at C- infetmakon tn Computer. Decumty has. many aspect 5: -e the nature ef th7ecths - us He nature of intruder? +i at Accichental deuba toss. — . Nadare of ( threats - ‘ ‘) ‘Trejan horses — LC “These funcion Gn be moclifs Aeleting or Peri rminy ee ‘on user file. + TH also copy File to ferticuay Place Teakre coucker can veover tt + -t4 can be placed on internet a any File to athaad amy user cftertion. a Peter that if user clown load and ain it then frofan horse c ge I invoked to pes Form. unexpected OPCTAHONS. - (2) - Yeap doors ~ C4 7s Piece of code “Zia rae cle, 14 em by the ole signer to Je} gees ~ quackty tether Himen, cob the time te tes aa Phase. «if the shonest programmer delibcrakely saves Hus cde in or simply nat wemember to remove [I “Polen tical Security holes Indrnaducedl. calyscluHion i9 ty reformed the sur * -Trtiuders — tt! 15 most well-enpwn thyeat _ ke security gener 5 packets aly _tef-ered to as Passive intruders wand po vead fle in @ Unuthorized “vay Acti G 7 un utho® ztc} q-eS ee _ ON mM +h g i uderg , atte: accident} _. Gome of the | acrdentay clata los¢ cave: Act of Jod- fires, Flood ec] hy ale © woUurs eyror 19 reacting - cig, creusaer. i - «ce err: . a) duman emo tniorrect clata eniry worong Pmyrdt wun tost cligk or tape “or Some Other mn [ota je rT) Ute wl gs TO — Annals of Protecdton « Protection mechanism refer to Parkin, operating system mechanigm—sonich . cme "5e9 fo protect taformaston , files cind Tesources ta compuler. Hee » Protechon mechanism has ceuCop fy, impmve vreltabritty of siny mPa _ systtm ta which Use of Shared _ _ re sources [> tnvolvecd ceo “There gre . many reasons tv offer fhe protection. 1 td is cnteded to provide the niet do avoid deliberate vio laHoP of an access restriction by User _____ « yl 15 necessary —fto— make sure ~ that, each Program _¢ Nt ~ YOnaing in. foe syskm ube system *esourtes as per defined Policits to ensure reliability of system. + Policies fe ‘mdkKke .use: of vesources of computer Systm are put sate eftect by Mechanism is offered by Protection EEE » some of the policles ave indude. ia the clesign of systema. Other Policies ave deci _ by He managment of System + many Polici@S are defined by the inciuiduct} user of the system _ to protect their acon eta Progr . fe ‘ Prfecton syskro showd be fleable Xp otter clifterenk and eat tad - the citererd Nee of Poiies ae + littered {Yee of apeliedton have. “| eee of resource use. + dpplicabton Propyvummer should be _ __ulse__ Protection" mechanism to protect —_—7eseurces. _creale aqaing+ mreuse _ A sey view) - +_-T} the us€y 15 workin on cl i Stagle Pc fer hig work © then __Parformanre (io mostly faxen tate oNsiclonaHw, 7 «tf many oer working on worksahiy, con mainframe © minicompuler oy servers they share ‘resource ; i of the semper 7 ys ~The uscy view of computer varies — acerclin to tndey fate being Used. - the got) fs ts maximize “the — a work “thal user [5 perfor ming oe é ‘ dD 7 nl of ec, consisting of moniter, _ | Key System unit | Such A Sustem ts clesign fey one User to mMonvpslize ifs resource, | ' jae a cilegs fe calle —__.| 86 Measure - eo er eee ~ + —Ti_manayes the ke red re Te Sources ~ of computer system f- —____» Resources. dtled proce 55075 ee memory, cligk and other storage [ aa device lo cevice uch as keyboard i ad monitors So on- a =the cperatking system muck dere how 4 CWocal them tp SPecific programs ancl Users Sa thet} it” cin operate the com puber sustain |” _efficteaty —-_difeerea} view of operakng system the wee Tlo cleutce.. and user | Hl eae ing . te fi condm| Pp Manages the aia exeruHon of User Programs fs - prevent eranrs n.d iMpmper Use. pe OF the Gomputey lens fam. Ting Cte OO -Diltercn pe 0 CVO ling aya enls 7 Boch ing sustem= o the ofeva}erS at the. computer _ sistem. woud gmup the lob a5 per _ Programming Sr eS la The fol? cohich —eequirecl land 7 _ —Pancessing time were _ctassifi Sd do tong J an which hack Shert a ___ PmcessyA Hme- wis cdassiffed as Short 3 Pe ea «othe entive processing wWds but Ericess) the besic of sof of JoOhs e There wus no. user interact {fo processing “the Joh UU] rer aja busy cU_a_time in _emcessing one Proyram. 2 Tf dny Tlo required, then PROCESO? as ed ts | high eoith compare: to zo eae i urnce of the Proces i Tele (zak on «lug . Poor -cind tool remain iclle for most of Hime. _ 7 —TIn_this SCend rid Only “one prdvqm _ wodg kept in memory at a Hove of eer hion: a O35 does not permit the user te ans inberad usith -execult OPA ¢ Tob Srhedd'ay.’ ta 4 poof Q in_order to orriuval net is fret come first. Serve basis, Pee eee seria. therefor Accesses te file ae re aD manager) ig gimele 4S no : pro tecHon_ ro mequired. Feet a AS one Saget of memory OS %¥ site eB used tn lo [ ee for _execuon, 4h ent_(o_ cUSd_S| sie cornet asta ane better fax [ ae E Vv Pay ae Job ond ui ae not Needed —__| pis ee busy ct) | fhe time G0, ___its _ulilizahion is “inereased- fe a Multipmgsammecd Operating Sys ae » Multipmgrg var malay to required f Support “= mat elé _ pracesges 1 Gimatbeneo fe Ee 2 Since mulHple processes are re 2, Vesiclont 7 _in_ memory at same time, it I norease Processor ullizahon if the. Prpcesses a aré Z)o hound. ee —* ceU. ulilizakion tnorease ag oh | _ ie ge PMCeESSES on time, | —+_PtulHeregiamming gives illuston of -aunming multiple” process ad once — and prvide usey with. TeSPoN Se _ SESH ei naees a» fl sin iagle ae “canno}_ Weep either —cev_e%-Tlo device busy all the. Hime, op erating fete Support a fe mitt p TO gr mM og a 4 all pergoncdt comp fe —operaling Es 7 tt 4 ety t— + — —-SYsteM_ support fer mwWhPreqy Al the boot time “Senentng — PWYTaMs start uatitlt Severs ae mul D ¢ = Sistem organic tke Jo as one Soh +o _ ay cpu “alssaya 7 — execute. ,— multi pm Fammj OG improves _ ce “ube ization caneen a 1 &xamples of operand Sdotem are —UNTX, Linux Windows pe : 7 Time shared operating Guster ~ sul eg era 7 * Multiple users "are aes by Lime Shared operating System to ch the machine at the’ same me . ee aa system: ig cupable of thing each acon in a very \e55 oe edch user need Can he Fulfilled tn very less +Hme af parkcuay user programm execukes. me py system cind Lf ct ° Ts ae gra : cWoctor of computer esources jn dime slots EN severe : ; Oy Hoe Sharing munner _ 2 Considey ex of multiple users Logy-ec| fq Game seryey the | __wesource fa _strver_machine like cep gets cWocatedl te earch USe7 \ vy yyy yy yy 4 ns eee) “Lie, MuliprocesseY— Systeme + mulliple processor Cun -AGtESS, these on time sharing .pasis. giv ast the _ feetine an ‘each user that oor) : a | Sxchsivedy the aim of Hme gharing pis do offer cin _interacHue . tele cubtion. "of computer aystem te ite user. L ‘Many USers can Shave the Tesource _ Of compuked sustem cut the same Hime « User can _exerute thelr Sir a seneu) Hime slot cWocife d fo I alter expircahion of fae “lak ister guitches +o Other US L Ae ‘ocheduling is Used’ and. fine ig dtutded % “eex _gch-edwhin Criterra the time sharing system - offers _ atyaight = — of usens. _* MULH pr cessor opeyak aeeae 7 offers support for _muttple prmcessors having access to shaved memory. a In hese case, CW dlatg gotudar required by operat — Sokem. tes ae a ardwure _,“ together cvith. mu CPUS are Shurecl menor plated a clatd , heace pr tection vec j simultaneous” acess is ne o Prmmige Conei stency. a the main aim of ma ltip C oper aliog- system is te athpeee - eyformance by) me: - multiple cpus I = hit the commuoicuhion a made b ee —datq cu Share. 0 ancl tt iS wequire S pap teed that deta eigen Sk Concurien. access. eidtndows and [tnux ore multiemcessay operating system a At Distaibu Lecl ystems. o collect on OF ehysically. Later 6 . Posakly ‘nelero geneous Lompaker Mstems vi USCr” with. access +o tue TeESOUY CES that system maintains. o_compukey _Nelwork is defrrod: as set : Gar — connected tehathor by communtcotron links. these “clevice fnclude= comp Printers, and other device cupuble of 7 sending and teceivin 4 informahion farm other sevice _o nedworkk. SO CoMpubey: nelwork 1 inher Conhecte sc} ee eae oe +f digi bake l_aystern 16 defined role appear: tn its User _as single coh ere nd — Sisbem. \ yoy Fd | | 1 a q } oy 4 |: ) _clistind architecture — an __ dist peal ae {— “tke intesaction of user ~cincl_aP Ataf [a | with dietbakes) ~oystem ts onsistent [ + Distribubed syskeo— Showd always [ @ tantly “curled system i Fal “Slagle glob cl view OF —&) Loos ~coupied Systems ~ _