0% found this document useful (0 votes)
58 views11 pages

Operating System

A presentation on Operating System

Uploaded by

itsmerakhi8940
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views11 pages

Operating System

A presentation on Operating System

Uploaded by

itsmerakhi8940
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Submitted By:

Rakhi Yadav
0901eo221049

Submitted To:
Dr. Gaurav Khare

Operating System
(220221)
CONTENTS

01 02 03 04 05
Basics of File
Operating Process
Memory Storage System
System & Synchroniza
Manage Manage Interface
Process tion &
ment ment & System
Management Deadlock
Protection
Basics of Operating
System

Protec There are five generations of OS that are discovered yet.


tion & Gener Among them we use fourth generation nowadays and
Security ations fifth generation is under progress.

Types There are various types of OS available, and they can be


of OS classified on various criteria such as their funtionality,
System features and applications.
Calls Basics of
OS
Structur The structure of OS can vary depending upon the specific OS
e of OS being used, but generally they have a basic structure that have
Kernal, Device Drivers, System Libraries & User Interface.
Services
In OS System
Boot System boot is the process of starting up of an OS. As it is a complex
text process so it have multiple stages: POST, Boot Loader, Kernal
Initialization, Init process, User space Initialization.
Process Management
in OS

Process Scheduling Scheduling Threading


States Criteria Algorithms Issues

A process can be in done in the The aim of a process There are several scheduling Threading can introduce a
five states : New, Ready, scheduling is to allocate CPU algorithms: FCFS, SJF, Priority number of issues some are:
Running, Blocked & time to different processes in Scheduling, Round Robin, Thread Safety, Deadlock,
Terminated. an efficient manner. Multi-level Queue. Thread Scheduling, Thread
Coordination.
Process Synchronization
In OS
Classical Problems of
Introduction to PS Synchronization
PS is essential in modern OS, which Some of classical problems of synchronization
often run multiple processes or are: Producer-Consumer Problem, Readers-
threads simultaneously. 01 04 Writers Problem, Dining-Philosophers Problem.

Peterson’s Solution Monitors


It is a widely used synchronization
05
Monitors are a useful synchronization
algorithm that solves the critical
subsection problem. The Peterson’s
02 construct that provides an abstraction
layer for managing shared resources.
solution works in multiple states.

How Monitors differ


Semaphores
Semaphores are a synchronization
03 06 from Semaphores
Both are used in concurrent programming
tool used in cs to manage access but have some fundamental differences:
shared resources in a concurrent Abstraction level, Mutual exclusion,
system. Signaling, Ease of use & Limitations
Deadlock

Definition Deadlock Prevention


It is a situation when two processes 1. Resource Allocation Algorithms
are unable to execute simultaneously. 2. System Design Techniquesa

Reasons of Deadlock Banker’s Algorithm


Poor Implementation, Poor Architecture ,
It is a resource allocation algorithm
Poor Maintenance & Poor System Design.
used to prevent deadlocks.

Deadlock Detection Recovery from Deadlock


A process of identifying that whether a There are several ways to recover form a
system has entered in a deadlock state. deadlock: Resource preemption, Rollback,
Killing Processes.
Memory
Management

Here in this unit we have studied memory management, as we


know that it works in ROM so we have also discussed some
processes like: Swapping, Contiguous Memory Allocation,
Paging, Segmentation, Demand Paging & Thrashing. Also we
have studied Logical & Physical Addresses and Virtual
Memory.
In paging we have discussed Page Table and Structure of Page
Table . We have also studied some Page Replacement
Algorithms like: Optimal Page Replacement, FIFO, LRU,
LFU.
We have also take a look on the allocation of frames, strategies
for allocating frames to processes, including fixed allocation,
dynamic allocation and priority allocation.
Storage Management

Mass-Storage Disk Structure Disk Attachment Disk Scheduling RAID Structure


Structure
The mass-storage structure Modern Magnetic drives are It refers to the method It is a crucial component of A variety of disk-
in an OS refers to the way organized as 1-D arrays of through which an OS mass-storage management in organizations techniques,
data is organized and logical blocks, where each connects and interacts with an OS. We have some collectively called as
managed on large capacity block represents the smallest physical storage devices algorithms for this: FCFS, RAID(Redundant Arrays of
storage devices like HHDs unit of data that can be such as HHDs & SSDs. SSTF, SCAN, C-SCAN, Independent Disks).
or SSDs. transferred. LOOK.
File System
Interface

File Concept
Access Methods Allocation Methods Free-Space Management
Files are used for all I/O of
There are various methods to The allocation methods define Free space management is a
information in the OS, to
access a file into a computer how the files are stored in the critical aspect of operating
standardize access to both disk blocks. There are three
system some are: Sequential systems as it involves
software and hardware. Input main disk space or file
Access, Direct Access, Index managing the available
occurs when the contents of a allocation methods.
Sequential Access & many •Contiguous Allocation storage space on the hard disk
file is modified. Output
more. •Linked Allocation or other secondary storage
occurs when the contents of
•Indexed Allocation devices.
one file is read or transferred
to another file.
System
Protection

Domain of Access Access


Goals
Protection Matrix Control

Access Matrix is a security


Ensures the security and A process is bound to Access control is a
model of protection state in
integrity of the system. use only those data security process
computer system. It is is
Prevents unauthorized resources which it that enables
used to define the rights of
access, misuse, or requires to complete organizations to
each process executing in
modification of the OS its task, in the time manage who is
the domain with respect to
and its resources. limit that it requires authorized to access
each object. The rows of
Protects sensitive data. and also the mode in corporate data and
matrix represent domains
Provides a secure which it is required. resources.
and columns represent
environment for users That is the protected
objects.
and applications. domain of a process.
Thank You
For Listening

You might also like