Exploring Operating Systems: From Evolution To Security
Exploring Operating Systems: From Evolution To Security
24 Cluster-Aware Applications
contents
25 Factors Affecting Operating System Performance
Introduction to Operating
Systems
Importance of Operating
01 02 Abstraction of Hardware
Systems
Operating systems are essential software Operating systems hide the technical
that manage computer hardware and complexities of the underlying hardware
provide services for computer programs. from the applications running on top of
them.
They enable multiple users, processes,
and applications to run on a single piece
of hardware.
Real-time operating
03
systems (RTOS)
Guarantee tasks within a predefined time
Used in critical environments like
factories, power plants, and vehicles
Manages programs, file systems, and Connect specific hardware devices to the Include user interfaces, installation tools,
hardware access to prevent conflicts. kernel for proper functionality. logging tools, editors, and system update
processes.
01 02 03 04 05
Simultaneous
Illusion of Parallel Preemptive Process
Processes on a I/O Suspension
Running Processes Multitasking Suspension
Single CPU Core
In most computer Operating systems create This scheduling principle The operating system Processes waiting for I/O
systems, multiple the illusion of parallel is known as preemptive periodically decides if a are suspended until the
processes run running processes by multitasking. running process should I/O request is finished,
simultaneously on a scheduling each process be suspended in favor of freeing the CPU for other
single CPU core. to run for a short time another process. processes.
frame.
File systems need to be mounted by the Operating systems provide file sharing
operating system before they can be functionality, enabling access to files on
accessed, typically assigned a drive one system by users on other systems,
letter or mount point for recognition. enhancing collaboration and data
accessibility.
System calls are interfaces provided by the operating system that allow
applications to request services from the operating system.
APIs (Application Programming Interfaces) are sets of rules and protocols that
allow one software application to interact with another, facilitating the use of
system calls.
System calls and APIs play a crucial role in enabling communication between
software applications and the operating system, providing access to various
functionalities and resources.
Developers utilize system calls and APIs to perform tasks such as file
operations, process management, memory allocation, and network
communication within their applications.
Memory Management in
Operating Systems
Memory Management in Operating Systems
Operating systems also utilize Direct Memory Access (DMA) for efficient
data transfers.
Operating System
Configuration
Operating System
Configuration
Configuration of an operating system is
stored in an operating-system specific
database or in text files.
Windows environments utilize the
Windows registry for configuration
settings.
UNIX and Linux systems rely on text-
based configuration files typically stored
in the /etc directory.
Configuration files in UNIX and Linux are
organized by functionality, with separate
files for different system aspects like
DNS or host information.
User-friendly tools are provided for
editing configuration files in UNIX and
Linux systems.
AT&T sold UNIX System Laboratories to Known for hierarchical file system.
Novell in 1993, transferring UNIX
trademark to The Open Group. Small tools for specific tasks.
Pipes for command combination.
Specific hardware requirements. Applications running on a particular UNIX Popularized by UNIX with nested
flavor cannot run on another without subdirectories.
recompiling.
UNIX uses a large set of small tools that UNIX utilizes pipes for combining
do specific tasks efficiently. commands without storing intermediate
results.
Available through companies like Red Hat Allows for easier porting of systems from
and Novell. UNIX to Linux.
Offers distribution and support contracts. More compatible compared to other
operating systems.
Known for its widespread use on personal Highly versatile Apple's proprietary operating system
computers and servers
Used in servers, workstations, mobile Designed for their laptops and desktops
Various versions like Windows 10 and devices, and even supercomputers
Windows Server 2019 Known for its user-friendly interface
Open-source nature
04 UNIX 05 z/OS
Application Management in
03
Clusters
A failover cluster manages applications
by grouping them into resource pools or
application packages.
These packages contain essential
components like application name, start
and stop scripts, monitor script, virtual IP
address, and mount points for storage.
Components of a Resource
04 05 Ensuring High Availability
Pool
Application name Monitoring application status
Start and stop scripts Initiating restarts or failovers
Monitor script
Virtual IP address
Mount points for storage
Cluster-Aware Applications
Cluster-Aware Applications
Cluster-aware applications are designed
to operate within a clustered
environment.
These applications are aware of the
cluster's configuration and can leverage
its resources efficiently.
They can detect changes in the cluster's
state and adjust their behavior
accordingly.
Cluster-aware applications enhance
system reliability and performance by
utilizing failover capabilities.
These applications can seamlessly
transition between cluster nodes to
ensure continuous operation.
Efficient allocation and de-allocation of Proper scheduling of processes ensures Well-organized file systems contribute to
memory impact overall system optimal CPU utilization and faster data access and retrieval.
performance. responsiveness.
Enhanced Security: Minimizing the kernel size can reduce the attack
surface, making the system more secure.
Implementing Host-Based
Firewalls
Host-Based Firewalls