Vous êtes sur la page 1sur 19

UNIT 1 INTRODUCTION AND OVERVIEW OF OPERATING SYSTEMS

O.S.@K.I.T

3/17/2012

O.S.@K.I.T

3/17/2012

What is an OS?
Abstract views
To a college student: SW that permits access to the Internet To a programmer: SW that makes it possible to develop programs on a computer system To a user of an application package: SW that makes it possible to use the package To a technician in a computerized chemical plant: invisible component of a computer system that controls the plant

An abstract view focuses only on essential characteristics

O.S.@K.I.T

3/17/2012

Operating system designer also has an abstract view

OS is a collection of routines that facilitates execution of user programs and use of resources
O.S.@K.I.T 3/17/2012

We use abstract views to present design of OS components. It has two benefits:


Managing complexity
Abstract view contains only selected features of a system

Presenting a generic view


For example, user interface has many variants in practice
Command line interface Graphical user interface (GUI)

O.S.@K.I.T

3/17/2012

Logical and physical organization

O.S.@K.I.T

3/17/2012

Fundamental goals of an operating system


1) Efficient use of computer resources 2) User convenience 3) Noninterference in the activities of its users

When these goals conflict, designer makes a trade-off for Notion of effective utilization
Each OS provides a different flavor of effectiveness Efficient use User convenience

O.S.@K.I.T

3/17/2012

OS ensures efficient use of memory, CPU, and I/O devices OS itself consumes CPU and memory resources, which constitutes overhead
It reduces resources for user programs

Poor efficiency can result if a program does not use a resource allocated to it

OS can monitor use of resources to ensure efficiency OS uses policies that ensure efficiency
It would increase the overhead

O.S.@K.I.T

3/17/2012

O.S.@K.I.T

3/17/2012

User can face interference in computational activities


Program execution or operation of OS can be disrupted by actions of other persons
OS prevents interference by allocating resources for exclusive use of programs and OS services, and preventing illegal accesses to resources

Illegal file access


OS knows which user files can be accessed by whom Achieved through authorization

O.S.@K.I.T

3/17/2012

Principal functions of OS:


Program management Resource management Security and protection

Concern

OS responsibility

Programs

Initiation and termination of programs. Providing convenient methods so that several programs can work towards a common goal.
Ensuring availability of resources in the system and allocating them to programs. Deciding when and for how long, to devote the CPU to a program. Protect data and programs against interference from other users and their programs.
O.S.@K.I.T 3/17/2012

Resources Scheduling Protection

O.S.@K.I.T

3/17/2012

OS can interleave execution of programs on a fast CPU


Scheduling decides which program should be given the CPU at any time
Policy influences efficient CPU use and user service Preemption: Taking away the CPU from a program

O.S.@K.I.T

3/17/2012

Resource allocations and deallocations can be done with a resource table


Entry: name, address and status of a resource unit Constructed by the boot procedure, maintained during operation

O.S.@K.I.T

3/17/2012

Popular resource allocation strategies:

Resource partitioning OS decides a priori what resources to allocate to each user program; divides system resources into partitions
A resource partition is a collection of resources

Pool-based

Resource table contains entries for partitions Simple to implement, but lacks flexibility OS allocates resources from a pool of resources
Consults table and allocates the resource if it is free

Less overhead of allocating and deallocating resources Achieves more efficient use of resources

O.S.@K.I.T

3/17/2012

A virtual resource is a fictitious resource

Abstract view of a resource taken by a program Supported by OS through use of a real resource Same real resource may support several virtual ones Started with the use of virtual devices
E.g., a print server

Provides effect of having more resources Most OSs provide virtual memory Some OSs create virtual machines

May execute a program bigger than size of RAM


Each virtual machine can be allocated to a user
O.S.@K.I.T 3/17/2012

Security counters threats of interference or


illegal use posed by persons/programs outside OS control
Authentication: only registered user can use a computer system

Protection counters threats posed by users of


an OS
Memory protection is a HW feature used by OS to thwart disruption of programs and OS services Authorization thwarts interference with files

O.S.@K.I.T

3/17/2012

O.S.@K.I.T

3/17/2012

Intruders are outsiders who can cause


interference
May use or create malicious programs Trojan horses Viruses Worms

Methods of addressing security threats


Authentication techniques Plugging security holes Internet firewalls

O.S.@K.I.T

3/17/2012

Vous aimerez peut-être aussi