OperatingSystem-Lab9
OperatingSystem-Lab9
Lecture 1:
BASICS OF OPERATING SYSTEM
Operating System: A program that acts as a midway
between a user of a computer and the computer hardware;
Make the computer system convenient to use
Kernel: The one program running at all times on the
computer
bootstrap program: Initializes all aspects of system and
Loads operating system kernel and starts execution
Caching – copying information into faster storage system;
main memory can be viewed as a cache for secondary
storage
Device Driver for each device controller to manage I/O,
Provides uniform interface between controller and kernel
System call – request to the OS to allow user to wait for
I/O completion
Device-status table contains entry for each I/O device
indicating its type,
Main Memory:
The only large storage media directly accessible by the CPU.
Features RAM.
Typically volatile (data is lost when power is off).
Secondary Storage:
Extension of main memory with large
nonvolatile storage capacity.
Hard Disks:
Constructed with rigid metal or glass platters coated with magnetic
recording material.
Disk surface is logically divided into tracks, further subdivided into
sectors.
A disk controller manages logical interactions between the disk
and the computer.
Solid-State Disks (SSDs):
Faster than hard disks.
Nonvolatile.
Lecture 2-
Clustered Systems: Multiple systems work together, often
using shared storage (SAN) for high availability.
A Dual-Core Design: Multi-chip and multicore
Two types:
Asymmetric Multiprocessing – each processor is assigned
a specific task.
Symmetric Multiprocessing – each processor performs all
tasks
Process Management
Memory Management
. Storage Management
Provides a logical view of storage, abstracting physical differences.
File-System Management: Creates/deletes files, manages access
control, and maps storage.
Mass Storage Management:
o Disk Management – free-space, allocation, and disk
scheduling.
o Tertiary Storage – slower storage like optical disks,
managed differently.
I/O Subsystem
Computing Environments
Virtualization
Cloud Computing
Slide 2: Resources
Summary:
Summary:
Summary:
Definition:
Summary:
Summary:
Summary:
Summary:
Summary:
Summary:
Preemption is tricky.
Taking a printer mid-job = chaos.
Can work for resources like memory pages (can be restored).
Summary:
Summary:
Summary:
Graph with:
o Processes (P) and Resources (R).
o Request edge: P → R
o Assignment edge: R → P
Slide 17: Resource Allocation Graph (Cont.)
Summary:
Summary:
Example:
o C holds T, wants U.
o D holds U, wants T.
o → Deadlock
Helps visualize issues.
Summary:
No cycle = no deadlock.
Cycle:
o With one instance per resource = deadlock.
o With multiple instances = possible deadlock.
Summary:
Recovery Strategies:
Summary:
Summary:
Summary:
Here is a clear and focused summary of the text-only slides from Chapter 6:
Memory Management of your Operating Systems Security course. I've skipped
image-only slides and retained definitions in simple terms for easier studying.
Introduction
A computer must load programs and data into memory to run them.
Keeping multiple processes in memory improves CPU use and system
response time.
Memory management methods depend heavily on hardware support.
Memory Basics
Background
These registers define the valid memory address range for a program.
The CPU checks every user-mode memory access to stay within this range.
Swapping
Swapping Constraints
Contiguous Allocation
Memory split into two parts: one for the OS and one for user processes.
Each process gets one continuous memory block.
Memory Protection
Fragmentation
Compaction
Paging
Paging Mechanics
CPU uses page number and offset from logical address to find the physical
address.
Logical address: High bits = page number; low bits = offset within page.
Segmentation
Final Summary
2. File Attributes
3. File Operations
You can create, read, write, seek, delete, open, and close files.
5. Open Files
6. File Locking
7. File Structure
Can be:
o No structure (just bytes)
o Record-based (lines, fixed/variable)
o Complex formats like executables
8. Access Methods
9. Directory Structure
All files in one big list – easy, but confusing if many users.
22. Summary
2. Principles of Protection
3. Domain Structure
4. Access Matrix
A table:
o Rows = domains (users/processes)
o Columns = objects (files, devices)
o Cells = what access (read, write, etc.)
7. Security Problem
8. Violation Categories
9. Violation Methods
19. Passwords
21. Firewalls
Processes
Data stores
Data flows
Trust boundaries – lines showing where trust changes (e.g., between
internet and server)
Tips:
Be linked to a threat
Be clearly explained
Be tested
Check:
Tips: