0% found this document useful (0 votes)
14 views

Unit 1 Part 2

Uploaded by

aman jatain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Unit 1 Part 2

Uploaded by

aman jatain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Operating-System Structures

Operating-System Structures

System Components
Operating System Services
System Calls
 System Programs
 System Structure
 Virtual Machines
 System Design and Implementation
System Generation
Common System Components
Process Management
Main Memory Management
Secondary-Storage Management
 I/O System Management
 File Management
 Protection System
 Networking
Command-Interpreter System
Process Management
A process is a program in execution. A process needs
certain resources, including CPU time, memory, files,
and I/O devices, to accomplish its task.
The operating system is responsible for the following
activities in connection with process management.
 Process creation and deletion.
 process suspension and resumption.
 Provision of mechanisms for:
• process synchronization
• process communication
Main-Memory Management

Memory: large array of words or bytes, each


addressable by the CPU and I/O devices.

Main memory is a volatile storage device.


Memory management activities :

– Keep track of which parts of memory are currently being


used and by whom.
– Decide which processes to load when memory space
becomes available.
– Allocate and de allocate memory space
Secondary-Storage Management
 Since main memory (primary storage) small and volatile, the
computer system provides secondary storage to back up main
memory.

 Most modern computer systems use disks as the principle on-


line storage medium.

 Disk management activities:

– Free space management


– Storage allocation
– Disk scheduling
I/O System Management

The I/O system consists of:

– A buffer-caching system
– A general device-driver interface
– Drivers for specific hardware devices
File Management
A file is a collection of related information defined by its
creator (usually programs and data.)

 File management activities:

– File creation and deletion.


– Directory creation and deletion.
– Support of primitives for manipulating files and
directories.
– Mapping files onto secondary storage.
– File backup on stable (nonvolatile) storage
media.
Protection System

Protection refers to a mechanism for controlling access


by programs, processes, or users to both system and
user resources.

 The protection mechanism must:

– distinguish between authorized an unauthorized usage.


– specify the controls to be imposed.
– provide a means of enforcement
Networking (Distributed Systems)

A distributed system is a collection processors that do not


share memory or a clock.
Connected through a communication network.
A distributed system provides user access to various
system resources.
Access to a shared resource allows:
– Computation speed-up
– Increased data availability
– Enhanced reliability
Command-Interpreter System
The program that reads and interprets control
statements is called variously:

– control-card interpreter
– command-line interpreter
– shell (in UNIX)

Its function is to get and execute the next command


statement.
Operating System Services
Program execution –load and run program.
I/O operations –perform I/O on behalf of user
 File-system – read, write, create, and delete files.
Communications – exchange of information between
local or remote processes. Implemented via shared
memory or message passing.
 Error detection – ensure correct computing by
detecting errors in the CPU and memory hardware, in
I/O devices, or in user programs.
System Calls
System calls: interface between running program and
the operating system.
– Generally assembly-language instructions.
– wrapper libraries provide high-level interface
Three general methods are used to pass parameters:

– Pass parameters in registers.


– Store the parameters in a table in memory.
– Push (store) the parameters onto the stack by the
program.

You might also like