0% found this document useful (0 votes)
37 views17 pages

Operating System Lecture 4

The document discusses several topics related to operating systems including caching, protection and security, virtualization, computing environments like mobile, distributed, client-server and cloud computing, and open-source operating systems.

Uploaded by

mohamed faisal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views17 pages

Operating System Lecture 4

The document discusses several topics related to operating systems including caching, protection and security, virtualization, computing environments like mobile, distributed, client-server and cloud computing, and open-source operating systems.

Uploaded by

mohamed faisal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 17

Operating Systems

By
Dr Tariq
(Lecture 4)

1
Caching
 Important principle, performed at many levels in a computer
(in hardware, operating system, software)
 Information in use copied from slower to faster storage
temporarily
 Faster storage (cache) checked first to determine if
information is there
 If it is, information used directly from the cache (fast)
 If not, data copied to cache and used there
 Cache are smaller (size-wise) than storage being cached
 Cache management important design problem
 Cache size and replacement policy
Performance of Various Levels of Storage

Movement between levels of storage hierarchy can be


explicit or implicit
Migration of data “A” from Disk to Register

 Multitasking environments must be careful to use most


recent value, no matter where it is stored in the storage
hierarchy

 Multiprocessor environment must provide cache coherency in


hardware such that all CPUs have the most recent value in
their cache
Protection and Security
 Protection – A mechanism for controlling access of processes
(or users) to resources defined by the OS
 Security – A defense of the system against internal and
external attacks
 Huge range, including denial-of-service, worms, viruses, identity
theft, theft of service
 Systems generally first distinguish among users, to determine
who can do what
 User identities (user IDs, security IDs) include name and
associated number, one per user
 User ID is associated with all files and processes of that user to
determine access control
 Group identifier (group ID) allows set of users to be defined and
controls managed, then also associated with each process, file
 Privilege escalation allows user to change to effective ID with
more rights
Virtualization
 Allows operating systems to run applications within other OSes
 Vast and growing industry
 Emulation used when the source CPU type is different from the
target type (i.e., PowerPC to Intel x86)
 Generally slowest method
 When computer language not compiled to native code – Interpretation
 Virtualization – OS natively compiled for CPU, running guest OSes
also natively compiled
 Consider VMware running WinXP guests, each running applications, all
on native WinXP host OS
 VMM (virtual machine Manager) provides virtualization services
Virtualization on Laptops and Destops

 A VMM allow the user to install multiple operating


systems to run application written for operating systems
other than the native host.
 Apple laptop running Mac OS X host Windows as a guest
 Developing apps for multiple OSes without having multiple
systems
 Testing applications without having multiple systems
 Executing and managing compute environments within data
centers
Virtualization Architecture Structure
Computing Environments - Traditional

 Stand-alone general purpose machines


 But blurred as most systems interconnect with others (i.e.,
the Internet)
 Portals provide web access to internal systems
 Network computers (thin clients) are like Web terminals
 Mobile computers interconnect via wireless networks
 Networking becoming ubiquitous – even home systems use
firewalls to protect home computers from Internet attacks
Computing Environments - Mobile

 Handheld smartphones, tablets, etc


 What is the functional difference between them and a
“traditional” laptop?
 Extra features – more OS features (GPS -- Waze)
 Allows new types of apps like augmented reality
 Use IEEE 802.11 wireless, or cellular data networks for
connectivity
 Leaders are Apple iOS and Google Android
Computing Environments – Distributed

 Collection of separate, possibly heterogeneous, systems


networked together
 Network is a communications path, TCP/IP most common
 Local Area Network (LAN)
 Wide Area Network (WAN)
 Metropolitan Area Network (MAN)
 Personal Area Network (PAN)
 Network Operating System provides features to allow sharing
of data between systems across a network.
 Communication scheme allows systems to exchange messages
 Illusion of a single system
Computing Environments – Client-Server

 Dumb terminals supplanted by smart PCs


 Many systems now servers, responding to requests
generated by clients
 Compute-server system provides an interface to client to
request services (i.e., database)
 File-server system provides interface for clients to store and
retrieve files
Computing Environments - Peer-to-Peer
 Another model of distributed system. P2P does not distinguish clients and servers
 Instead all nodes are considered peers
 Each node may act as client, server, or both
 Node must join P2P network
 Registers its service with central lookup service on network, or
 Broadcast request for service and respond to requests for service via discovery protocol
 Examples include Napster and Gnutella, Voice over IP (VoIP) such as Skype
Computing Environments – Cloud Computing

 Delivers computing, storage, even apps as a service across a network


 Logical extension of virtualization because it uses virtualization as the base
for it functionality.
 Amazon EC2 has thousands of servers, millions of virtual machines,
petabytes of storage available across the Internet, pay based on usage
 Many types
 Public cloud – available via Internet to anyone willing to pay
 Private cloud – run by a company for the company’s own use
 Hybrid cloud – includes both public and private cloud components
 Software as a Service (SaaS) – one or more applications available via the
Internet (i.e., word processor)
 Platform as a Service (PaaS) – software stack ready for application use
via the Internet (i.e., a database server)
 Infrastructure as a Service (IaaS) – servers or storage available over
Internet (i.e., storage available for backup use)
Computing Environments – Cloud Computing

 Cloud computing environments composed of traditional


OSes, plus VMMs, plus cloud management tools
 Internet connectivity requires security like firewalls
 Load balancers spread traffic across multiple applications
Computing Environments – Real-Time Systems

 Real-time embedded systems most prevalent form of


computers
 Vary considerable, special purpose, limited purpose OS, real-time
OS
 Use expanding
 Many other special computing environments as well
 Some have OSes, some perform tasks without an OS
 Real-time OS has well-defined fixed time constraints
 Processing must be done within constraint
 Correct operation only if constraints met
Open-Source Operating Systems

 Operating systems made available in source-code format


rather than just binary closed-source
 Counter to the copy protection and Digital Rights
Management (DRM) movement
 Started by Free Software Foundation (FSF), which has
“copyleft” GNU Public License (GPL)
 Examples include GNU/Linux and BSD UNIX (including core of
Mac OS X), and many more
 Can use VMM like VMware Player (Free on Windows),
Virtualbox (open source and free on many platforms -
http://www.virtualbox.com)
 Use to run guest operating systems for exploration

You might also like