OSY Report Krushna
OSY Report Krushna
1 3.Proposed Methodology 1
4. Action Plan 2
5. Resources Required 2
1.Rationale 4
i
Annexure I
2. Component Breakdown: Analyze each component's function and role within the
operating system.
4. Compare Different OS: Briefly compare how various operating systems (e.g.,
Windows, Linux) manage core components.
5. Document Findings: Summarize insights and key takeaways on the role of each
component and their interactions within the OS.
1
4. Action Plan:
5. Resources Required:
Sr.
No Name of resource / material Specification Quantity Remarks
.
1 Computer WINDOWS 10, 2GB 1 ok
RAM, 160GB HDD
2 Operating System WINDOWS 10 1 ok
4 Browser Google Chrome 1 ok
2
6. Name of Team Members with Roll No.’s:
Sr.
Enrollment No. Name of Team Member Roll No.
No.
1. 2210950210 Suryawanshi Krushna Dattatray 29
Mr. Chavan A Y
3
Annexure – II
Micro-Project Report
1. Rationale:
This topic is also relevant as it builds foundational knowledge that can be applied
across various operating systems, helping learners appreciate the differences and
similarities between systems like Windows, Linux, and macOS. With this knowledge,
they can better troubleshoot issues, optimize performance, and understand how
different OS designs impact user experience and application behavior.
2. Aims/Benefits of the Micro-Project:
-The aim of studying operating system components is to provide learners with a
deep understanding of the OS structure, equipping them with practical skills for
troubleshooting and optimizing systems, which benefits them by enhancing their
technical expertise in system management.
-By analyzing each component—like the kernel, process management, and memory
management—students not only learn how these elements support system stability
and efficiency but also benefit from developing versatile knowledge that is applicable
across various operating systems, preparing them for technical careers. ----
Additionally, comparing different OS designs allows learners to critically evaluate
system performance and user experience, benefiting their analytical skills and
adaptability in IT fields.
4
3. Course Outcomes Achieved:
4. Literature Review:
Process management
Files management
Command Interpreter
System calls
Signals
Network management
Security management
5
Certainly! Here’s a brief overview of each of the components you've listed that are
crucial for the functioning of an operating system:
1. **Process Management**:
2. **Files Management**:
6
3. **Command Interpreter**:
- Also known as the shell, the command interpreter processes user commands
entered via a command-line interface or through scripts. It interprets commands,
interacts with the operating system, and executes programs or system calls based on
user input.
7
4. **System Calls**:
- System calls provide the means for programs to request services from the
operating system. They serve as an interface between user applications and the OS,
enabling operations like file manipulation, process control, and communication.
5. **Signals**:
8
6. **Network Management**:
7. **Security Management**:
9
8. **I/O Device Management**:
- This component manages the input and output devices of a computer, ensuring
efficient data transfer between devices and the CPU. It includes device drivers,
buffering, and spooling to optimize performance and facilitate communication with
peripheral devices.
10
9. **Secondary Storage Management**:
- Secondary storage management deals with the organization and access of data
stored on non-volatile storage devices, such as hard drives and SSDs. It handles tasks
such as data retrieval, storage allocation, and maintaining file systems to ensure
efficient and reliable data access.
11
These components are essential for the operation of an operating system, working
together to provide a stable and efficient computing environment.
12
Here's a simplified diagram illustrating the main components of an operating system,
showing how the kernel connects with other essential parts like process
management, memory management, file system, device management, I/O system
management, user interface, and security & access control. Each component is
represented with a small icon for clarity. Let me know if you'd like any further
details.
13
4. Security and Isolation : The OS enforces security via authentication, access
control, and process isolation. It protects data and ensures that processes don’t
interfere with each other.
14
8. Applications of this Micro-Project:
15