0% found this document useful (0 votes)
11 views42 pages

Final PPT Week2 (2) (1) Windows

The document provides an overview of key components and concepts related to CPU, Windows OS, and its architecture, including the booting process, process management, memory management, file systems, and device management. It compares Windows and Linux operating systems, discusses types of kernels, and outlines installation requirements. Additionally, it covers Windows services, registry, and various scheduling algorithms used in process management.

Uploaded by

Sudheer Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views42 pages

Final PPT Week2 (2) (1) Windows

The document provides an overview of key components and concepts related to CPU, Windows OS, and its architecture, including the booting process, process management, memory management, file systems, and device management. It compares Windows and Linux operating systems, discusses types of kernels, and outlines installation requirements. Additionally, it covers Windows services, registry, and various scheduling algorithms used in process management.

Uploaded by

Sudheer Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Team 2

Team Members:
Poojasritha
Senthilkumar
Swamulu Bolla
Roshin Chandra
Haritha Govindan
Saiteja Potluri
Sudheer Reddy
Rushikesh Dane
Table of Content
• CPU
• Windows OS
• Windows Kernel
• Windows Booting Process
• Windows Process Manager
• Windows Memory Manager
• Windows File System
• Registry & services
• Windows Device Management

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 2


What is CPU?
• The computer's Central Processing Unit(CPU) is the portion of a computer that retrieves and executes
instructions.

•Control Unit(CU)
•Arithmetic Logic Unit(ALU)
•Registers
•Cache
•Buses
•Clock

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 3


Processor

• A processor is the logic circuitry that responds


to and processes the basic instructions that
drive a computer.

Processor Number​ i7-8550U​


Cores​ 4​
Threads​ 8​
Processor Base 1.80​
Frequency​
Max Turbo Frequency​ 4 GHz​
Cache​ 8MB ​
TDP​ 15 W​

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 4


Architecture Cores
Complex Instruction Set Architecture (CISC)
⦁ The main idea is that a single instruction will do all loading, evaluating, and storing operations just
like a multiplication command will do stuff like loading data, evaluating, and storing it, hence it’s
complex.
⦁ The CISC approach attempts to minimize the number of instructions per program but at the cost of
an increase in the number of cycles per instruction.
Reduced Instruction Set Architecture (RISC)
⦁ The main idea behind this is to make hardware simpler by using an instruction set composed of a few
basic steps for loading, evaluating, and storing operations just like a load command will load data, a
store command will store the data.
⦁ Reduce the cycles per instruction at the cost of the number of instructions per program.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 5


Introduction to Windows OS

• Windows is a graphical operating system developed by Microsoft.


• It was released for both home computing and professional works.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 6


Types of OS
Network OS Real time OS

Distributed OS Multitasking OS
Distributed OS Multitasking OS

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 7


Windows VS Linux
Windows LINUX

While windows are the not the open source operating


Linux is a open source operating system.
system.

While it is costly. Linux is free of cost.

While it’s file name is case-insensitive. It’s file name case-sensitive.

While in this, micro kernel is used. In linux, monolithic kernel is used.

While windows are less efficient. Linux is more efficient in comparison of windows.

While there is back slash is used for Separating the There is forward slash is used for Separating the
directories. directories.

While it provides less security than linux. Linux provides more security than windows.

While windows does not provide much efficiency in Linux is widely used in hacking purpose based
hacking. systems.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 8


Workstation OS VS Server OS

Server Operating System Client Operating System

It can be used to provide services to multiple client. It can obtain services from a server.

It can serve multiple client at a time. It serves a single user at a time.

It is complex operating system. It is simple operating system.

It runs on the server. It runs on the client devices like laptop, computer etc.

It is an operating system that is designed to be used on


It is an operating system that operates within desktop.
server.

It provides more security. It provides less security.

It has greater processing power. It has less processing power.

It is more stable. It is less stable.

It is highly efficient. It is less efficient.

Examples: Red Hat, Linux. Examples: Windows, Android.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 9


Installation requirements

• Minimum installation requirements

RAM: 512MB
DISK SPACE: 32GB
PROCESSOR: 1.4GHz 64bit
• Recommended installation requirements

RAM: 4GB
DISK SPACE: 60GB
PROCESSOR: 2.4GHz 64bit

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 10


Windows Kernel
Introduction to Kernel:
• Kernel is known as the core of the Operating System.
• Kernel consists of user mode and kernel mode.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 11


Types of Kernel(‘Contd…’)

Monolithic Kernel:
• Kernels where the user services and the kernel
services are implemented in the same memory
space

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 12


Types of Kernel(‘Contd…’)

Microkernel:
• The user services and kernel services are
implemented into different spaces.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 13


Types of Kernel(‘Contd…’)

Hybrid Kernel:
• A Hybrid Kernel is a combination of both
Monolithic Kernel and Microkernel.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 14


Windows Kernel Architecture

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 15


Booting Process

Booting:
Set of operations that loads and starts the operating system.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 16


Booting Process (‘Contd…’)

Types Of Booting Process

•BIOS – Basic Input Output System


•UEFI – Unified Extensible Firmware Interface

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 17


Booting Process (‘Contd…’)

Phases In Booting Process:

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 18


Safe Boot Options

Windows Safe Mode bypasses startup programs and drivers that are not required for Windows to
load and will allow you to fix Windows problems .

•Press the Windows Key + R.


•Type msconfig in the dialog box.
•Select the Boot tab.
•Select the Safe Boot option and click Apply

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 19


Window Process Management
Process:
A Process can be thought of, as a program in execution.

Thread:
A Thread is the unit of execution within a process. A Process can have anywhere from just
one thread to many threads.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 20


Process States:

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 21


Process Handling:

● Multiprogramming

● Multiprocessing

● Multitasking

● Multithreading

● Hyper threading

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 22


Process Scheduling:

● Arrival time
● Completion time
● Burst time
● Turn Around time
● Waiting time

● Preemptive Scheduling
● Non-preemptive scheduling

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 23


Scheduling Algorithms:

● First-Come, First-Served (FCFS) Scheduling


● Shortest-Job-Next (SJN) Scheduling
● Priority Scheduling
● Shortest Remaining Time
● Round Robin(RR) Scheduling
● Multiple-Level Queues Scheduling

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 24


Window Memory Management
•Kernel memory is owned by windows and is used to provide system services to applications.

• Virtual memory consists of physical memory plus the amount of space in the page file, which is
stored but is no longer in use now.

•Cached memory holds data or program code that has been fetched into memory during the current
session but is no longer in use.

•Free memory represents RAM that does not contain any data or program code and is free for use
immediately.

•Virtual Address Space:


Set of virtual memory addresses that a process can be use.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 25


Paging
•Paging is a function of memory
management where a computer will
store and retrieve data from a device’s
secondary storage to the primary
storage.

•Page-in: Pages moved from hard disk to


main memory

•Page-out: Pages moved out from main


memory to hard disk

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 26


Paging Fault
•A page fault is an interruption that occurs when a software program attempts to access a memory
block not currently stored in the system's RAM

•Hard page fault must be resolved by reading page contents from the page’s backing store, which is in
the system paging file.

• A soft page fault can be resolved without accessing the page file.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 27


Memory Poll
•The nonpaged pool consists of virtual memory
addresses that are guaranteed to reside in physical Memory
memory as long as the corresponding kernel objects are Pool
allocated.

•The paged pool consists of virtual memory that can be


Non Paged
paged in and out of the system Paged Pool
Pool

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 28


Working SET
•Working set is the amount of physical memory currently in use by the process, set of pages in the
virtual address space of a process that are currently resident in the physical memory

•Private working set is the amount of memory that is dedicated to that process and that can not be
shared to other process .

•Shareable working set can be surrendered if physical RAM begins to run scares.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 29


File System
Introduction :
An file system is a method of storing and organising the computer files and the data they contain to
make it easy to find and access them.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 30


Types of file system :

• FAT (File Allocation Table)


• NTFS (New Technology File System)
• GPT
• ReFS

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 31


FAT 32 :
The FAT32 file system was developed by Microsoft in the year 1996. It was used in MS-DOS7.1 and
Windows 95 OSR2. It was designed to overcome the volume size limitations of FAT16.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 32


NTFS :
NT file system (NTFS), which is also sometimes called the New Technology File System, is a process that
the Windows NT operating system uses for storing, organizing, and finding files on a hard disk efficiency.

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 33


NTFS vs FAT32 :
Characteristics FAT32 NTFS
Structure Simple Complex
Max file size 4GB 16TB
Encryption Not encrypted Encrypted with Encrypting File
System (EFS)
Security Network type only Both local and network type
Fault tolerance No provision for Fault Automatic troubleshoot is
tolerance present
Compatability Windows Windows
ME/2000/XP/7/8.1 10/8/7/XP/VISTA/2000
Compression Compression is not allowed Compression is allowed
Accessing speed Low Relatively higher than other
File systems

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 34


File System Operations :

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 35


Registry

• It’s a database stores all our configuration


settings of software and user.
• This keys are volatile
• Windows + R regedit
• C:\Windows\System32\config

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 36


Windows Services

• They are core component of the Windows OS


• Enable the creation and management of long running
processes
• Examples of windows services
• Active Directory Service
• DNS Client Service
• ICS Service

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 37


Service Control Manager(SCM)

• It maintains database of installed services and driver


services.
• They allow system to start and run successfully
• Start up types
• 1)Automatic
• 2)Manual
• 3)Disable
• 4)Automatic Delay

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 38


Device Management:

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 39


References
• https://afteracademy.com/blog/what-is-kernel-in-operating-system-and-what-are-the-various-types-of
-kernel
• https://www.google.com/amp/s/www.geeksforgeeks.org/what-happens-when-we-turn-on-computer/
amp/
• https://www.javatpoint.com/booting-in-operating-system#:~:text=Booting%20is%20the%20process%2
0of,software%20into%20memory%20before%20execution
.
• https://youtu.be/VjPgYcQqqN0

©Larsen & Toubro Infotech Ltd. Privileged and Confidential 40


Thank you

You might also like