0% found this document useful (0 votes)
6 views17 pages

2 Operating System Exploration and Installations

The document provides a comprehensive overview of operating systems, detailing their purposes, functions, evolution, installation, administration, and design. It covers essential topics such as system calls, user interfaces, virtual machines, and safety precautions during OS operations. Additionally, it includes practical steps for installing various operating systems and troubleshooting common issues.

Uploaded by

nyashamajezah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views17 pages

2 Operating System Exploration and Installations

The document provides a comprehensive overview of operating systems, detailing their purposes, functions, evolution, installation, administration, and design. It covers essential topics such as system calls, user interfaces, virtual machines, and safety precautions during OS operations. Additionally, it includes practical steps for installing various operating systems and troubleshooting common issues.

Uploaded by

nyashamajezah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Operating System

Exploration and Installations


Diving Deeper into OS Functions, Administration, and Deployment
Mavhemwa P.M
Operating System: Purposes and Main
Functions
•Reviewing Purposes:
•Resource Manager: Efficiently allocates and manages hardware (CPU, memory, I/O) and software resources.
•Application Environment: Provides the necessary environment for application programs to run, preventing
conflicts.
•User Interface: Facilitates user interaction with the computer hardware (GUI, CLI).
•System Protector: Ensures system security, data integrity, and prevents unauthorized access.
•Main Functions (Recap & Expansion):
•Process Management: Creating, scheduling, terminating processes; handling inter-process communication and
synchronization.
•Memory Management: Allocating, deallocating, and protecting memory segments; virtual memory.
•File System Management: Organizing, storing, retrieving, and protecting files and directories.
•I/O System Management: Controlling I/O devices, buffering, caching, and spooling.
•Networking: Managing network connections and communication protocols.
•Command Interpretation: Translating user commands into system actions.
Evolution of Operating Systems (Brief Recap)
•From Bare Metal to Modern Systems:
•No OS (Manual Operation): Early computers, direct hardware interaction.
•Batch Processing: Improved efficiency by grouping jobs.
•Multiprogramming & Time-Sharing: Allowed multiple users/programs concurrently.
•Personal Computing: Democratization of computing with user-friendly interfaces (DOS,
•early Windows/Mac OS).
•Networked & Distributed Systems: Connecting computers for shared resources.
•Mobile, Cloud & Virtualization: Focus on portability, scalability, and resource optimization.
•Key Drivers of Evolution: Hardware advancements, user demands for usability,
•increasing complexity of applications, and the need for greater efficiency and security.
Operating System Installation: Planning and
Preparation
• Pre-Installation Steps:
• System Requirements Check: Verify CPU, RAM, disk space, and graphics
compatibility.
• Data Backup: Crucial to back up all important data from the target drive.
• Hardware Compatibility: Check for drivers for specific components
(network card, graphics card, etc.).
• Installation Media: Obtain bootable USB drive or DVD with the OS image.
• Product Key/License: Ensure you have the necessary activation keys if
required.
• BIOS/UEFI Settings: Configure boot order to prioritize installation media.
• Disk Partitioning (Optional but Recommended): Plan how to divide the
hard drive (e.g., separate partitions for OS, data, recovery).
Operating System Administration: Core Concepts
•User and Group Management:
•Creating, modifying, and deleting user accounts and groups.
•Assigning permissions and roles to control access.
•File and Directory Permissions:
•Setting read, write, and execute permissions for users/groups on files and folders.
•Understanding ownership and access control lists (ACLs).
•Process and Service Management:
•Monitoring running processes, starting/stopping services.
•Troubleshooting unresponsive applications.
•System Monitoring and Logging:
•Checking system performance (CPU, RAM, disk I/O).
•Reviewing system logs for errors, security events, and warnings.
•Software Installation and Updates:
•Managing application installations and ensuring the OS and applications are up-to-date.
•Network Configuration:
•Setting up IP addresses, DNS, proxy settings, firewall rules.
•Security Management:
•Implementing firewalls, antivirus, regular security audits, patching vulnerabilities.
Operating System Services and User Interface
•Operating System Services: Functions provided by the OS to programs and users.
•Program Execution: Loading and running programs.
•I/O Operations: Handling input/output requests.
•File-System Manipulation: Creating, deleting, accessing files.
•Communications: Facilitating inter-process and network communication.
•Error Detection: Detecting and handling hardware/software errors.
•Resource Allocation: Distributing CPU cycles, memory, etc.
•Accounting: Tracking resource usage.
•Protection and Security: Ensuring system integrity and data privacy.
•User Operating System Interface:
•Command-Line Interface (CLI): Text-based interface (e.g., Bash, PowerShell, Command Prompt).
•Pros: Powerful, precise, scripting capabilities.
•Cons: Steep learning curve, less intuitive.
•Graphical User Interface (GUI): Visual, icon-based interface (e.g., Windows Desktop, macOS Finder,
•GNOME/KDE on Linux).
•Pros: Intuitive, easy to learn, visually appealing.
•Cons: Can be resource-intensive, less efficient for repetitive tasks
System Calls and Types of System Calls
•System Call:
•The programmatic way in which a computer program requests a service from the kernel of the
operating system.
•Acts as an interface between a process and the operating system.
•Why System Calls? Applications cannot directly access hardware or privileged instructions;
they must request the OS to perform these operations on their behalf.
•Types of System Calls (Categories):
•Process Control:
•create_process(), terminate_process(), load(), execute(), wait(), signal().
•File Management:
•open(), close(), read(), write(), delete(), rename().
•Device Management:
•request_device(), release_device(), read(), write().
•Information Maintenance:
•get_time(), set_time(), get_process_attributes(), set_process_attributes().
•Communication:
•create_pipe(), create_shared_memory(), send_message(), receive_message().
•Protection:
•set_permission(), get_permission().
System Programs and OS Design &
Implementation
•System Programs (Utilities):
•Provide a convenient environment for program development and execution.
•Perform useful tasks for users or assist the OS in its functions.
•Examples: File managers (copy, delete, move), text editors, compilers, web browsers,
command interpreters (shells), status information utilities, communication programs.
•They are not part of the kernel but interact with it via system calls.
•Operating System Design and Implementation:
•Design Goals: User goals (convenience, ease of use, reliability, safety, speed) vs. System goals (design,
implementation, maintenance, flexibility, features, error-free).
•Mechanism vs. Policy:
•Mechanism: How to do something (e.g., how to switch contexts between processes).
•Policy: What will be done (e.g., which process to run next based on a scheduling algorithm).
•Implementation: Traditionally written in assembly language (for speed/control), then C (for portability and
system-level access). Modern OSes are largely C/C++.
•Layered Approach: OS functions are divided into layers, each built on top of lower layers.
Operating System Structure and Virtual Machines

•Operating System Structure (Review & Context):


•Monolithic: Single, large kernel (e.g., Linux - hybrid, Windows).
•Layered: OS divided into distinct layers (historical significance).
•Microkernel: Minimal kernel, most services in user space (e.g., Mach, QNX).
•Modular: Components can be loaded/unloaded dynamically (e.g., modern Linux kernel modules).
•Virtual Machines (VMs):
•Concept: Software emulation of a physical computer system.
•A single physical machine (host) can run multiple isolated virtual machines (guests), each with its own OS.
•Hypervisor (Virtual Machine Monitor - VMM): Software that creates and runs VMs.
•Type 1 (Bare-metal): Runs directly on hardware (e.g., VMware ESXi, Hyper-V).
•Type 2 (Hosted): Runs as an application on top of an existing OS (e.g., Oracle VirtualBox,
VMware Workstation).
•Benefits: Resource utilization, testing/development environments, security isolation, disaster recovery,
running legacy software.
OS Generation and System Boot Safety Precautions
•Operating System Generation (SYSGEN):
•The process of creating a specific OS configuration for a particular hardware environment.
•Involves selecting kernel components, device drivers, and system utilities required for the target
machine.
•Less common for typical users with modern OS installers, but relevant for embedded systems or highly
customized deployments.
•System Boot Process (Simplified):
1.BIOS/UEFI Startup: Firmware initializes hardware, performs POST (Power-On Self-Test).
2.Boot Loader: BIOS/UEFI finds and loads the boot loader from a designated storage device (e.g.,
MBR/GPT).
3.Kernel Loading: Boot loader loads the OS kernel into memory.
4.Kernel Initialization: Kernel initializes system components, device drivers.
5.Init System/Service Startup: The OS starts essential services and processes (e.g., systemd,
SysVinit).
6.User Interface: Presents login screen or desktop environment.
•Safety Precautions During OS Operations:
•Regular Backups: Prevent data loss before major changes or for disaster recovery.
•Antivirus/Anti-Malware: Protect against malicious software.
•Firewall: Control network traffic and prevent unauthorized access.
•Strong Passwords & User Accounts: Secure access to the system.
•Software Updates: Keep OS and applications patched against vulnerabilities.
•Proper Shutdown: Avoid data corruption and ensure system integrity.
•Avoid Unknown Sources: Be cautious when downloading/installing software.
Visible Windows: History of MS Windows & Interface
•History of Microsoft Windows:
•Early Versions (1.0-3.1): Graphical shells built on top of MS-DOS.
•Windows 95/98/ME: Integrated OS with GUI, introduced Start menu, Taskbar.
•Windows NT Line (NT, 2000, XP, Vista, 7, 8, 10, 11): More robust, secure,
and stable kernel; designed for business, later consumer.
•Key Milestones: Introduction of Plug and Play, DirectX, .NET Framework,
touch interfaces, cloud integration.
•Windows Interface (Common Elements):
•Desktop: Primary workspace with icons and shortcuts.
•Taskbar: Contains Start button, search, running applications, system tray.
•Start Menu: Access to applications, settings, power options.
•File Explorer: Navigates file system.
•Control Panel/Settings App: System configuration.
•Windows Explorer/File Explorer: Manages files and folders.
•Snap Assist/Multi-tasking features.
Operating System Folder Structure and Tech Utilities
•Common Windows Folder Structure:
•C:\ (Root Drive): Main system drive.
•Program Files (x86)/Program Files: Installed 32-bit/64-bit applications.
•Users: User profiles (Desktop, Documents, Downloads, Pictures, etc.).
•Windows: Core OS files (System32, SysWOW64, Fonts, Drivers, etc.).
•ProgramData: Application data shared by all users.
•Temp: Temporary files.
•Essential Tech Utilities (Windows Examples):
•Task Manager: Monitor processes, performance, manage startup programs.
•Disk Management: Partition, format, assign drive letters.
•Device Manager: Manage hardware devices and drivers.
•Event Viewer: View system logs.
•Registry Editor (regedit): Advanced system configuration.
•Services: Manage background services.
•Resource Monitor: Detailed resource usage.
•Command Prompt/PowerShell: CLI for system administration.
•Disk Cleanup/Defragment and Optimize Drives: Maintenance tools.
Installation of Linux Operating System (General Steps)
•1. Choose a Distribution: (e.g., Ubuntu, Fedora, Debian, Linux Mint).
•2. Download ISO Image: Get the installer file.
•3. Create Bootable USB/DVD: Use tools like Rufus (Windows) or Etcher (cross-platform).
•4. Boot from Installation Media: Configure BIOS/UEFI to boot from USB/DVD.
•5. Live Environment (Optional): Many distros offer a "Try Linux" option to test before installing.
•6. Start Installation: Follow the on-screen prompts.
•7. Language, Keyboard, Time Zone: Select preferences.
•8. Installation Type:
•"Install alongside [current OS]": Dual-boot setup.
•"Erase disk and install Linux": Dedicate entire disk to Linux.
•"Something else" (Manual Partitioning): Advanced users.
•9. User and Password Setup: Create your primary user account.
•10. Installation Completion: Reboot and remove installation media.
•11. Post-Installation: Run updates, install drivers, install preferred software.
Oracle VirtualBox: Setting up a Virtual Machine
•What is Oracle VirtualBox? A free, open-source Type 2 hypervisor for creating and running virtual
machines.
•Steps to Create a VM in VirtualBox:

1.Download and Install VirtualBox: Get from virtualbox.org


.

2.Click "New": To start the VM creation wizard.


3.Name and OS Type: Give VM a name, select OS type and version (e.g., "Windows 10", "Linux Ubuntu").
4.Memory Size: Allocate RAM from your host machine (e.g., 2GB for lightweight OS, 4GB+ for Windows).
5.Hard Disk: Create a new virtual hard disk (VDI recommended) or use an existing one.
Choose size (dynamically allocated is common).
6.Settings (Optional but Recommended):
•System: Enable I/O APIC, increase processors, enable virtualization features (VT-x/AMD-V).
•Display: Increase video memory, enable 3D acceleration.
•Storage: Mount your OS ISO image as a virtual CD/DVD.
•Network: Choose network adapter type (NAT for internet, Bridged for direct network access).
7.Start the VM: Click "Start" and proceed with OS installation inside the VM.
8.Install Guest Additions: After OS installation, install Guest Additions for better integration
(e.g., shared clipboard, drag-and-drop, display scaling).
Installing & Upgrading Windows: Process & Troubleshooting

•Preparing for Installation or Upgrade: (Refer to Slide 4 - Pre-Installation)


•Key Addition for Upgrades: Check application compatibility with the new OS version.
•Key Addition for Upgrades: Ensure enough free disk space for the upgrade process.
•Installation and Upgrade Process:
•Clean Install:
1.Boot from Windows installation media.
2.Select "Custom: Install Windows only (advanced)."
3.Delete/format partitions as needed.
4.Follow prompts for language, product key, user setup.
•In-Place Upgrade:
1.Run setup from within your current Windows OS.
2.Select "Keep personal files and apps."
3.Windows will migrate data and install the new version.
•Troubleshooting Installation Problems:
•"No boot device found": Check BIOS/UEFI boot order, verify installation media integrity.
•Blue Screen of Death (BSOD): Note error code, research specific driver issues or hardware failures.
•"Setup could not configure Windows": Often related to disk partitioning or driver issues.
•Installation stuck: Check hardware, try disabling specific components in BIOS, re-create installation media.
•Driver issues post-install: Download drivers from manufacturer websites.
•Post-Installation Tasks:
•Run Windows Update: Critical for security and stability.
•Install Drivers: Ensure all hardware is recognized and functioning.
•Install Essential Software: Web browser, antivirus, productivity suites.
•Personalize Settings: Desktop background, themes, power options.
•Configure Backup: Set up file history or system image backups.
Conclusion & Q&A
• Recap:
• Operating systems are indispensable for managing computer resources and providing
user interaction.
• Their evolution reflects advancements in hardware and user needs.
• Effective OS administration and understanding system calls are crucial for IT
professionals.
• Virtual machines offer powerful flexibility for various computing scenarios.
• Safe and methodical installation/upgrade practices are essential for system stability.
• Questions & Discussion:
• "Beyond the examples given, what are some other 'system programs' you use regularly
that interact with the OS kernel?"
• "If you were to install an OS, would you prefer a clean install or an in-place upgrade, and
why?"
• Thank you!

You might also like