operating systems

28
Operating Systems Introduction to Operating System (OS)

Upload: phyre

Post on 24-Feb-2016

23 views

Category:

Documents


0 download

DESCRIPTION

Operating Systems. Introduction to Operating System (OS). What is an Operating System (1)?. A modern computer consists of: One or more processors Main memory Disks Printers Various input/output devices. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Operating Systems

Operating Systems

Introduction to Operating System (OS)

Page 2: Operating Systems

2

What is an Operating System (1)?

• A modern computer consists of: One or more processors Main memory Disks Printers Various input/output devices.

• Managing all these varied components requires a layer of software – the Operating System (OS).

Page 3: Operating Systems

3 A. Frank - P. Weisberg

What is an Operating System (2)?• An Operating System is a program that acts as

an intermediary/interface between a user of a computer and the computer hardware.

• OS goals:– Control/execute user/application programs.– Make the computer system convenient to use.– Ease the solving of user problems.– Use the computer hardware in an efficient manner.

Page 4: Operating Systems

4 A. Frank - P. Weisberg

Where does the OS fit in?

Page 5: Operating Systems

5 A. Frank - P. Weisberg

Services provided by an OS

• Facilities for program creation– editors, compilers, linkers, debuggers, etc.

• Program execution– loading in memory, I/O and file initialization.

• Access to I/O and files– deals with the specifics of I/O and file formats.

• System access– resolves conflicts for resource contention.– protection in access to resources and data.

Page 6: Operating Systems

6 A. Frank - P. Weisberg

Why are Operating Systems Important?• Important to understand and know how to correctly

use when writing user applications. • Large and complex systems that have a high

economic impact and result in interesting problems of management.

• Few actually involved in OS design and implementation but nevertheless many general techniques to be learned and applied.

• Combines concepts from many other areas of Computer Science: Architecture, Languages, Data Structures, Algorithms.

Page 7: Operating Systems

7 A. Frank - P. Weisberg

Computer Hardware Organization

Page 8: Operating Systems

8 A. Frank - P. Weisberg

Computer System Components

1. Hardware – provides basic computing resources (CPU, Memory, I/O devices, Communication).

2. Operating System – controls and coordinates the use of the hardware among various application programs for various users.

3. System & Application Programs – ways in which the system resources are used to solve computing problems of the users (Word processors, Compilers, Web browsers, Database systems, Video games).

4. Users – (People, Machines, other computers).

Page 9: Operating Systems

9 A. Frank - P. Weisberg

Hierarchical view of computer system

Pinchas
Can "User Files" changed to "Users" ?
Page 10: Operating Systems

10 A. Frank - P. Weisberg

Static View of System Components

Page 11: Operating Systems

11 A. Frank - P. Weisberg

Dynamic View of System Components

Page 12: Operating Systems

12 A. Frank - P. Weisberg

Layers of a Computer System

EndUser

Programmer

Operating-System

Designer

Computer Hardware

Operating-System

Utilities

ApplicationPrograms

Page 13: Operating Systems

13 A. Frank - P. Weisberg

Views of an Operating System

• There are three classical views (in literature):1. Resource Manager – manages and allocates

resources.2. Control program – controls the execution of user

programs and operations of I/O devices.3. Command Executer – Provides an environment

for running user commands.• But one more modern view: the Operating

System as a Virtual Machine.

Page 14: Operating Systems

14 A. Frank - P. Weisberg

1 .Resource Manager

• Resource Manager:– Manages and protects multiple computer resources: CPU,

Processes, Internal/External memory, Tasks, Applications, Users, Communication channels, etc…

– Handles and allocates resources to multiple users or multiple programs running at the same time and space (e.g., processor time, memory, I/O devices).

– Decides between conflicting requests for efficient and fair resource use (e.g., maximize throughput, minimize response time).

• Sort of a bottom-up view.

Page 15: Operating Systems

15

OS as a Resource Manager

A. Frank - P. Weisberg

Page 16: Operating Systems

16 A. Frank - P. Weisberg

2 .Control Program

• Control Program:–Manages all the components of a complex

computer system in an integrated manner. –Controls the execution of user programs and

I/O devices to prevent errors and improper use of computer resources.

–Looks over and protects the computer: Monitor, Supervisor, Executive, Controller, Master, Coordinator ….

• Sort of a black box view.

Page 17: Operating Systems

17 A. Frank - P. Weisberg

3 .Command Executer

• Command Executer:– Interfaces between the users and machine. –Supplies services/utilities to users.–Provides the users with a convenient CLI

(Command Language Interface), also called a Shell (in UNIX), for entering the user commands.

• Sort of a top-down view.

Page 18: Operating Systems

18 A. Frank - P. Weisberg

Modern view: Virtual Machine (1)

• Operating System as a Virtual Machine:– An interface between the user and hardware that

hides the details of the hardware (e.g., I/O).– Constructs higher-level (virtual) resources out of

lower-level (physical) resources (e.g., files).– Definition: OS is a collection of software

enhancements, executed on the bare hardware, culminating in a high-level virtual machine that serves as an advanced programming environment. • virtual machine = software enhancement = extended

machine = abstract machine = layer = level = ring.

Page 19: Operating Systems

19 A. Frank - P. Weisberg

Modern view: Virtual Machine (2)

Page 20: Operating Systems

20 A. Frank - P. Weisberg

What is the OS/Kernel?• Is the Operating System just the Kernel (not

the utilities and application programs)?!• The Command Line Interface (CLI) (or

command layer/interpreter or shell) allows direct command entry by the user.

• The shell used to be in the kernel but now is a utility outside of it:– Easy to change/debug– Many of them (sh, bsh, csh, ksh, tcsh, wsh, bash)– Possible to switch between them (chsh)

Page 21: Operating Systems

21 A. Frank - P. Weisberg

Utilities Shell

Kernel

Hardware

User

UNIX Shell and Utilities

Page 22: Operating Systems

22

Process Management

• A process is a program in execution. It is a unit of work within the system. Program is a passive entity, process is an active entity.

• Process needs resources to accomplish its task– CPU, memory, I/O, files– Initialization data

• Process termination requires reclaim of any reusable resources• Single-threaded process has one program counter specifying

location of next instruction to execute– Process executes instructions sequentially, one at a time, until

completion• Multi-threaded process has one program counter per thread• Typically system has many processes, some user, some operating

system running concurrently on one or more CPUs– Concurrency by multiplexing the CPUs among the processes /

threads

Page 23: Operating Systems

23

Process Management Activities

The operating system is responsible for the following activities in connection with process management:

• Creating and deleting both user and system processes

• Suspending and resuming processes• Providing mechanisms for process

synchronization• Providing mechanisms for process

communication• Providing mechanisms for deadlock handling

Page 24: Operating Systems

24

Memory Management

• All data in memory before and after processing• All instructions in memory in order to execute• Memory management determines what is in

memory when– Optimizing CPU utilization and computer response

to users• Memory management activities

– Keeping track of which parts of memory are currently being used and by whom

– Deciding which processes (or parts thereof) and data to move into and out of memory

– Allocating and deallocating memory space as needed

Page 25: Operating Systems

25

Storage Management• OS provides uniform, logical view of

information storage– Abstracts physical properties to logical

storage unit - file– Each medium is controlled by device (i.e.,

disk drive, tape drive)• Varying properties include access speed, capacity,

data-transfer rate, access method (sequential or random)

• File-System management– Files usually organized into directories– Access control on most systems to determine

who can access what– OS activities include

• Creating and deleting files and directories• Primitives to manipulate files and dirs• Mapping files onto secondary storage• Backup files onto stable (non-volatile) storage

media

Page 26: Operating Systems

26

Mass-Storage Management• Usually disks used to store data that does not fit in main memory or data

that must be kept for a “long” period of time.• Proper management is of central importance• Entire speed of computer operation hinges on disk subsystem and its

algorithms• OS activities

– Free-space management– Storage allocation– Disk scheduling

• Some storage need not be fast– Tertiary storage includes optical storage, magnetic tape– Still must be managed– Varies between WORM (write-once, read-many-times) and RW (read-

write)

Page 27: Operating Systems

27

I/O Subsystem

• One purpose of OS is to hide peculiarities of hardware devices from the user

• I/O subsystem responsible for– Memory management of I/O including buffering

(storing data temporarily while it is being transferred), caching (storing parts of data in faster storage for performance), spooling (the overlapping of output of one job with input of other jobs)

– General device-driver interface– Drivers for specific hardware devices

Page 28: Operating Systems

28

Protection and Security• Protection – any mechanism for controlling

access of processes or users to resources defined by the OS

• Security – defense of the system against internal and external attacks– Huge range, including denial-of-service, worms,

viruses, identity theft, theft of service• Systems generally first distinguish among

users, to determine who can do what– User identities (user IDs, security IDs) include

name and associated number, one per user– User ID then associated with all files, processes of

that user to determine access control– Group identifier (group ID) allows set of users to

be defined and controls managed, then also associated with each process, file

– Privilege escalation allows user to change to effective ID with more rights