OS-Assignment
OS-Assignment
INCULCATING PROFESSIONAL
DIGNITY
Submission Date:
Page |0
1. What is Process Management? (Discuss)
Process Management is a key function of an operating system that involves handling all aspects
of processes within a system. A process is an instance of a program in execution, and the OS is
responsible for creating, scheduling, and terminating these processes.
CPU scheduling algorithms determine which process gets the CPU next. Key scheduling
algorithms include:
Page |1
3. Expound on Inter-Process Communication (IPC) in Operating Systems [6 Marks]
Inter-Process Communication (IPC) allows processes to exchange data and synchronize their
actions. This is crucial in multitasking environments.
Types of IPC:
1. Shared Memory:
o Multiple processes access a common memory space.
o Fast, but needs synchronization mechanisms like semaphores to avoid conflicts.
2. Message Passing:
o Processes communicate via messages sent and received through the OS.
o Useful in distributed systems. Can be:
Synchronous (blocking)
Asynchronous (non-blocking)
Mechanisms used:
Input/Output (I/O) software in the OS manages communication between hardware devices and
applications. It includes:
1. Device Drivers:
o Software modules that control specific hardware.
o Provide a standard interface to interact with various devices.
2. Interrupt Handlers:
o Handle asynchronous events from I/O devices.
o Notify the CPU when a device is ready for processing.
3. I/O Scheduling:
o Determines the order in which I/O requests are processed (e.g., FCFS, SCAN).
4. Buffering:
o Temporarily stores data in memory while transferring between devices and
applications to handle speed mismatches.
5. Spooling:
o Stores data for devices (like printers) that can't accept interleaved data streams.
Page |2
6. I/O Protection:
o Ensures unauthorized access to devices is prevented.
The OS abstracts hardware complexity and ensures efficient and secure I/O operations.
Operating System security involves protecting system resources and data from unauthorized
access and threats. It ensures confidentiality, integrity, and availability.
Main components:
1. Authentication:
o Verifying the identity of users (e.g., passwords, biometrics).
2. Authorization:
o Granting access rights to users and processes based on policies.
3. Access Control:
o Discretionary Access Control (DAC), Mandatory Access Control (MAC), and
Role-Based Access Control (RBAC) restrict user actions.
4. Encryption:
o Protecting data at rest and in transit using cryptographic methods.
5. Auditing and Logging:
o Monitoring system activities to detect unauthorized actions or breaches.
6. Malware Protection:
o Preventing and detecting viruses, worms, trojans, etc., using firewalls and
antivirus software.
7. Security Updates:
o Patching vulnerabilities in the OS regularly to reduce risk.
OS security is critical in protecting both user data and system integrity from internal and external
threats.
Page |3