Unit I
Unit I
An Operating System performs all the basic tasks like managing files,
processes, and memory. Thus operating system acts as the manager of all
the resources, i.e. resource manager. Thus, the operating system becomes
an interface between the user and the machine. It is one of the most
required software that is present in the device.
Symmetric multiprocessing: all the processors can do any task allocated to it.
Advantages of Multi-Processing Operating System
Due to the multiple CPU, it can be more complex and somehow difficult to
understand.
4. Multi-Tasking Operating System
Multitasking Operating System is simply a multiprogramming Operating
System with having facility of a Round-Robin Scheduling Algorithm. It can
run multiple programs simultaneously.
There are two types of Multi-Tasking Systems which are listed below.
Preemptive Multi-Tasking
Cooperative Multi-Tasking
Advantages of Multi-Tasking Operating System
Multiple Programs can be executed simultaneously in Multi-Tasking
Operating System.
It comes with proper memory management.
3. The operating system can initiate The operating system does not initiate a
context switch from a running process context switch from a running process to
to another process. another process.
4. A malicious program initiates an A malicious program can bring the entire
infinite loop, it only hurts itself system to a halt by busy waiting or running
without affecting other programs an infinite loop and not giving up control.
or threads.
3. It takes less time for job processing. It takes more time to process the jobs.
4. In this, more than one process can be In this, one process can be executed
executed at a time. at a time.
5. It is tightly couped .sychronization is No sychronization is there
there in multiprocessing.
6. The number of users is can be one or The number of users is one at a time.
more than one.
Networking causes delays in the transfer of data between nodes of a distributed system. Such
delays may lead to an inconsistent view of data located in different nodes, and make it
difficult to know the chronological order in which events occurred in the system.
Control functions like scheduling, resource allocation, and deadlock detection have to be
performed in several nodes to achieve computation speedup and provide reliable operation
when computers or networking components fail.
Messages exchanged by processes present in different nodes may travel over public
networks and pass through computer systems that are not controlled by the distributed
operating system. An intruder may exploit this feature to tamper with messages, or create
fake messages to fool the authentication procedure and masquerade as a user of the system.