Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
100%
(2)
100% found this document useful (2 votes)
6K views
Operating System - Technical Publication
hhkfuueguguyr 6v578
Uploaded by
Barik Pradeep
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Operating System - Technical Publication For Later
Download
Save
Save Operating System - Technical Publication For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
100%
(2)
100% found this document useful (2 votes)
6K views
Operating System - Technical Publication
hhkfuueguguyr 6v578
Uploaded by
Barik Pradeep
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Operating System - Technical Publication For Later
Carousel Previous
Carousel Next
Save
Save Operating System - Technical Publication For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 141
Search
Fullscreen
Operating System ee) ST are Daa eed CaO @ CHAPTERWISE SOLVED aS iS Nerneerer rater AT 2018 GSO eC UN‘As per Revised Sylobus of MSBTE - | SCHEME Operating System T.¥. Diploma (Semester - V) Computer Engineering / IT Program Group (CO/CMIIF/CW) Iresh A. Dhotre ME. (Information Technology) Ex-Faculty, Sinhgad College of Engineering Pune Poonam A. Vengurlekar Pursuing ME. (7), B.Tech. (IT) Lecturer, Thakur Polytechnie Kandivali Eost, Mumbo! Hitesh K. Mhatre ME. (Computer Engineering) I/C Head of Computer Engineering Department Pravin Patil College of Diploma Engineering cond Technology Thone ‘, . + TECHNICAL PUBLICATIONS ‘Wadste : wow tecrnicaipubications org ‘An Up-Thrust for Knowledge Bi https://wwu.facebook.corvtechnicalpublications oOperating System T.Y. Diploma (Semester - V) ‘Computer Engineesing / IT Program Group (CO/CMIIF/CW) Fiat Edton June 3019 © Copyright wih Authors All publishing rights (ornted and ebook version) reserved with Tachnical Publications. No past of this book should be reproduced in ony form, Electronic, Mechanical, Photocopy or any informetion storage ond
Manages access to the display subsystem and seamlessly composites 2D and 3D ‘graphic layers from multiple applications. + LibWebCore | A modern web browser engine which powers both the Android browser embeddable web view. + SGL/ 9D libraries engine, + SQLite : A powerful and lightweight relational database engine available to all applications. and an SGL is underlying 2D graphics Android run-time + Android indudes a set of core libraries that most of the functionality available in the core libraries of the Java programming language. + Every Android app runs in is own process with its, ‘own instance of the Dalvik virtual machine. The Dalvik VM executes files in the Dalvik Executable (dex) format. Slow Android apps 1. By default on Android, all work is done in a single thread, the "main application” thread. If a component of the work takes a long time, the rest of the work will be "blocked". For example, a ¥ TEGHNCAL PUBLICATIONS™ ep tiat er omtgoOperating System Overview of Operating System, Tong time to access data across the network prevents responding to any GUI events. 2. In the Android OS, if 2 GUI doesn't respond to an input event in five seconds, then it is considered unresponsive and the OS will try to kil it Android thread design 1. Only perform GUI actions on main application thread. Spawn separate threads to perform dataintensive or slow actions. Make these ‘threads asynchronous. 2. Main thread does not have to wait for/check on other threads. Instead, those threads run as they need to and report back to the original thread. ‘Any changes made to the UI should go through the UI thread. 1.9412] Comparison of Android OS Vs iPhone OS Features “Android OS iPhone OS: Limited intemal memory. y Big headache because and user have choice of apart from photos and different internal memory media content, the default sizes ‘memory is already limited Good internal memory No extemal expandable memory. Bul no card can be inserted $0 complaints here becouse Store photos, modia, etc the intemal memory itself is fuuge and good enough File File Transfer! ‘Transfor/Synchronization is Synchronization is just lke ‘easy. Plug and transfer Pods. the data in flash drive ‘mode, It broadcasts the Push notifications and system-wide notifications individual notifications on aed oes ela updates. It saves power ponbcaiaa because server pushes aan ore ata, No need to pall and ‘ean be pulled Bul cate down to soe doiails Register Listener, use ‘alback to read the informetion ‘Hardware Design/Suttons : Hardware Design/Butions : ‘Menu and buck buttons do One button is used for one| lear function. Menu and thing, The functionalities ‘back always mean what ny for different apps. __they imply. Android applications a. Android applications get distributed in a .apk file. APK stands for "Android Package’. It is simply a zip file that has a particular file structure, An APK contains 1. The Android Manifest file (an XML. file with lots of metadata). 2 A. Resource bundle containing sounds, graphics, ete. 3. The Dalvik classes that make up user application. 19.1.3] Android Benefits 1. An open and free development platform. Handset makers can use it without royalty and customize to their hearts content. 2. Component-based architecture : Lois of default components can be replaced straightforwardly. Proponents of Android point to the following benefi Lots of services : location, sql, maps, web, ete. b. Well managed applications; isolated from each other to protect data and provide security; c Operating system can quit programs as needed to ensure good performance on mobile devices. 4. Portability : To support a new device, a company hhas to port the virtual machine; Android apps (Dalvik) then execute on the new device with, little to no modification. 4.9.2 |ios +108 is the operating system that runs on iPad, iPhone and iPod touch devices. The operating system manages the device hardware and provides the technologies required to implement native apps. «The 408 Software Development Kit (SDK) contains the tools and interfaces needed to develop, install, run, and test native apps that appear on an iOS device's Home screen, + Fig, 1.9.2 shows iOS architecture. +The iOS Architecture is layered. At the highest level, iOS acts as an intermediary between the underlying hardware and the apps you create. * TEHRCAL PUBLICATIONS. Ann te taOperating System 1 Overview of Operating System, ‘Cocoa Touch ae Fig, 1.9.2 108 architecture + Apps do not talk to the underlying hardvrare directly. Instead, they communicate with the hardware through a set of well-defined system interfaces. These interfaces make it easy to write apps that work consistently on devices having different hardware capabilites. +The Cocoa Touch layer contains key frameworks for building 105 apps. These frameworks define the appearance of your app. They also provide the basic app infrastructure and support for key technologies such as multitasking, touch-based input, push notifications and many high-level system services «High-Level features of Cocoa touch layers are AisDrop, Multitasking, Auto Layout, Storyboards and Local Notifications And Apple Push, Notification Service. Cocoa touch layer contains following, frameworks for iPhone app development: a. UIKit framework b. Map kit framework ¢. Push notification service. . Message UI framework ©. Address book UI framework 4. Game kit framework g: iAd framework h, Event kit UI framework 4. Accounts framework j. Twitter framework = The Media layer contains the graphics, audio and video technologies you use to implement ‘multimedia experiences in your apps. The technologies in this layer make it easy for you to build apps that look and sound great. 19.21| Media Layer +The role of the Media layer is to provide 105 with audio, video, animation and graphics capabilities. + As with the other layers comprising the iOS stack, the media layer comprises a number of frameworks which may be utilized when developing iPhone apps. « The technologies in this layer make it easy for you to build apps that look and sound great + Features of media layer a. Graphics technologies b. Audio technologies Video technologies di. AitPlay + Media layer contains following frameworks 1. Core video framework : This framework provides buffering support for the Core media framework. Whilst this may be utilized by application developers it is typically not necessary to use this framework ‘The 10S core text framework is a C-based API designed to ease the handling of advanced text layout and font rendering. requirements, 3. Image YO framework : The Image VO framework, the purpose of which is to facilitate the importing and exporting of image data and image metadata, was introduced in {0S 4, The framework supports a wide range of image formats including PNG, JPEG, TIFF and GIF. 4. Assets library framework : The assets. library provides a mechanism for locating and retrieving video and photo files located on the iPhone device. In addition to accessing existing images and videos, this framework also allows new photos and videos to be saved to the standard device photo album. 2. Core text framework 5. Core graphics framework : The iOS core graphics framework provides a lightweight two dimensional rendering engine. Features of this framework include PDF document creation and presentation, vector based drawing, transparent layers, path based drawing, antialiased ¥ TECHNICAL PUBLICATONS™- Anup mst or eweaeOperating System 1-20 Overview of Operating System rendering, color manipulation and management, image rendering and gradients. 6. Core image framework : A new framework introduced with iOS 5 providing a set of video and image filtering and manipulation capabilities {or application developers. 7. Quartz core framework > The purpose of the Quartz Core framework is to provide animation capabilities on the iPhone. It provides the foundation for the majority of the visual effects and animation used by the UIKit framework and. provides an Objective C based programming, interface for creation of specialized animation within iPhone apps. 8. OpenGL ES framework : For many years the industry standard for high performance 2D and 3D graphics drawing has been OpenGL. OpenGL, for Embedded Systems (ES) is a lightweight version of the full OpenGL specification designed specifically for smaller devices such as the iPhone. 9. GLKit framework : The GLKit framework is an Objective-C based API designed to case the task of creating OpenGl. 8S based applications 10. NewsstandKit framework : The Newsstand application is a new feature of iOS 5 and is intended as a central location for users to gain access 10 newspapers and magarines. The Newsstandkit framework allows for the development of applications that utilize this new service. 11. 408 audio support : 105 is capable of supporting audio in AAC, Apple Lossless (ALAC), Alaw, IMA/ADPCM, Linear PCM, y-law, DVV/Intel IMA. ADPCM, Microsoft GSM 6.10 and AES3-2003 formats through the support provided by the following frameworks, 12. AV foundation framework © An Objective-C based framework designed to allow the playback, recording and management of audio content 19.22] Core Services Layer +The Core Services layer contains fundamental system services for apps. + Key among these services are the core foundation and foundation frameworks, which define the basic types that all apps use. + This layer also contains individual technologies to support features such as location, iCloud, social media and networking, + Features Peer-to-Peer services iCloud storage Automatic reference counting Block objects Grand central dispatch In-App purchase SQLite XML support File-sharing support, data protection + consists of the following frameworks. + Address book provides programmatic access to the iPhone Address Book contact database ollowing applications to retrieve and modify contact entries. (CENetwork framework : The CENetwork framework provides a C-based interface to the TCP/IP networking protocol siack and low level eecess to BSD sockets. This enables application code to be written that works with HTTP, FIP and domain name servers and to establish secure and encrypted connections using Secure Sockets Layer (SSL) or ‘Transport Layer Security (TLS). Core Data Framework : This framework is provided to ease the creation of data modeling and storage in Model-View-Controller (MVC) based applications. Use of the Core Data framework significantly reduces the amount of code that needs to be wrritlen to perform common tasks when working with structured data within an application. Core foundation framework : The core foundation framework is a Cbased Framework which provides basic functionality such as data types, string manipulation, raw block data management, URL manipulation, threads and run loops, date and times, basic XML manipulation and port and socket communication. framework : This * TEGHICAL PUBLICATIONS An st fr oweOperating System 1 +The core media framework is the lower level foundation upon which the AV foundation layer is built. + Core telephony framework : The 10S core telephony framework is provided to allow applications to interrogate the device for information about the current cell phone service provider and to receive notification of telephony related events, + EventKit framework : An API designed to provide applications with access to the calendar and alarms on the device. + Most applications will use iCloud document storage to share documents from a user's iCloud account This is the feature that users think of when they think of iCloud storage. A user cares about whether documents are shared across devices and can see and manage those documents from a given device. + Data protection allows applications that work with sensitive user data to take advantage of the built-in ‘encryption available on some devices. ‘+ When your application designates a specific file as protected, the system stores that file on-disk in an encrypted format. While the device is locked, the contents of the file are inaccessible to both your application and to any potential intruders. + However, when the device is unlocked by the user, a decryption Key is created to allow your application to access the file 1.923] Core OS Layer * The Core OS layer contains the low-level features that most other technologies are built upon + Even if you do not use these technologies directly in your apps, they are most likely being used by other frameworks. # And in situations where you need to explicitly deal with security or communicating with an external hardware accessory, you do so using the frameworks in this layer + This layer provides a variety of services including low level networking, access to external accessories and the usual fundamental operating system services such as memory management, file system hhandling and threads. a Overview of Operating Sytem + The Core OS layer occupies the bottom position of the iOS stack and, as such, sits directly on top of the device hardware, +The layer provides a variety of services including low level networking, access to extemal accessories and the usual fundamental operating system services such 2s memory management, file system handling and threads. + Accelerate framework : Introduced in iOS 40, the Accelerate framework contains interfaces for performing DSP, linear algebra and image-processing calculations. ‘The advantage of using this framework over writing your own versions of these interfaces is that they are optimized for all of the hardware configurations present in i05, based devices. Therefore, you can write your code once and be assured that it runs efficiently on all devices. + External accessory framework : It provides the ability to interrogate and communicate with extemal accessories connected physically to the iPhone via the 90-pin dock connector or wirelessly Bluetooth. + Security framework : The {OS Security framework Provides all the socurity interfaces you would expect to find on a device that can connect to external networks including, certificates, public and private keys, trust policies, key chains, encryption, digests and Hast-based Message Authentication Code (HMAC) + The core bluetooth framework allows developers to interact specifically with Bluetooth Low-Energy ("LE") accessories. The Objective-C interfaces of this framework allow you to scan for LE accessories, connect and disconnect to ones you find, read and waite attributes within a service, register for service and attribute change notifications and much more. + System : The system level encompasses the kernel environment, drivers and low level UNIX interfaces of the operating system, The Kernel itself is based ‘on Mach and is responsible for every aspect of the operating system. + It manages the virtual memory system threads, file system, network and interprocess communication The drivers at this layer also provide the interlace via r TECHNICAL PUBLICATIONS". Anup tite rowlcneOperating Syste La Onerviow of Operating Systern botwoen the available hardware and system MS-DOS default control programs, referred to as frameworks. device drivers, for various hardware components. + For security purposes, access to the Kemel and drivers is restricted to a limited set of system frameworks and applications. +108 provides a set of interfaces for accessing many low-level features of the operating system. Your application accesses these features through the LibSystem library. [E10] command Line based OS +The command line is also called the Windows command line, command screen, or text interface. It is a user interface that is navigated by typing commands at prompts, instead of using the mouse. + Unlike a GUL operating system, a command line only uses a keyboard to navigate by entering commands and does not navigating, utilize @ mouse for ‘*Command Prompt is a command line interpreter application available in most Windows operating, systems. It's used to execute entered commands, ‘+ Most of those commands automate tasks via scripts and batch files, perform advanced administrative functions, and troubleshoot or solve certain kinds of Windows issues. 4.10.1 | Dos + Disk Operating System (DOS) is created by Microsoft : MS-DOS. MS-DOS is a disk operating system for IBM PC-compatible computers. + As with any other operating system, its function is to oversee the operation of the system by providing, support for executing programs, controlling YO devices, handling errors, and providing the user interface +MS-DOS is 2 disk-based, single-user, single-task operating system. These qualities make it one of the easiest disk operating, systems to understand +The main portions of MS-DOS are the 10.$YS, ‘MSDOS.SYS, and COMMAND.COM files. + TO.SYS and MSDOSSYS are special, hidden system files +The IOSYS file moves the system's basic /O functions into memory and then implements the + The COMMAND.COM command interpreter accepts commands issued through the keyboard, or other input device, and carries them out according to the commands definition = When DOS runs an application, COMMAND.COM finds the program, loads it into memory, and then gives it control of the system, When the program is shut down, it passes control back to the command interpreter. «= Directory is just like a file folder, which contain all the logically related files, DOS files are organized in a hierarchical or an inverted tree-like structure + DOS enables the user to organize the files in a disk into directories and sub-directories. A directory within another directory is called a sub-directory 440.2 | UNIX + Unix was designed to be a time sharing system. + Unix has a simple user interface that has the power to provide the services that user want. ‘uses @ hierarchical file system that allows easy maintainance and efficient implementation. + Unix file system is @ multilevel tree « Each user data file is simply a sequence of bytes. It provides a simple, consistent interface to peripheral device. « Unix supporis multiple processes «Unix is a multiuser, multiprocess system. CPU scheduling in Unix is a simple priority algorithm. «Swapping is used if a system is suffering from excess paging, + Unix hides the machine architecture from the uses. + The system is written in high level language. + Unix consists of two separable parts : The Kernel and the systems programs + The Kemel interacts with the machines hardware 4 Shell interacts with the user. « Viewing the system as a set of layers, the operating system is commonly called the Kernel. Ft TEOHRACAL PUBLICATIONS" A up ter rowageOperating System 1 The Kemel provides the file system, CPU scheduling, memory management through system calls, Architecture of Unix OS There are three levels : a. User level. b. Kernel level. Hardware level, +The file subsystem manages files, alleoating. file space, controlling access to files and retrieving data for users. Processes interact with the file subsystem via a specific set of system calls, The file subsystem accesses file data using a buffering mechanism that regulates flow between the Kemel and secondary storage devices. The buffering mechanism interact with block VO device drivers to initiate data transfer to and from the Kernel +Tardware control is responsible for handling interrupts and for communicating with the machine Devices such as disks or terminals may interrupt the CPU while a process is executing. «The Kernel may resume execution of the interrupted process after servicing the interrupt = The process control subsystem is responsible for Process synchronization, IPC, memory management and process scheduling. The file subsystem and the process control subsystem interact when loading a file into memory for execution. The process subsystems reads executable files into memory before executing them. +The memory management module controts the allocation of memory. If at any time the system does not have enough physical memory for all processes, the Kemel moves them between main memory and secondary memory so that all processes get a fair chance to execute +The scheduler module allocates the CPU to processes, ‘=The scheduler module allocates the CPU tw processes. It schedules them to ran in tum until they voluntarily relinguish the CPU while awaiting a resource or until the kemel preempts them when their recent run time exceeds a time quantum. ‘The hardware control is responsible for handling interrupts and for communicating with the machine ¥ 2 Overview of Operating Sytem Devices such as disks or terminals may interrupt the CPU while a process is executing, [4.11] cut based os The second approach allows the user to interface with the OS via a graphical user interface or GUL Rather than having usors directiy enter commands via a commanc-line interface, a GUI allows provides a mouso-based window-and-menu system as an interface. + Graphical user interfeces first appeared due in past to research taking, place in the early 1970s at Xerox PARC research facility. The first GUI appeared on the Xerox Alto computer in 1973, ‘* However, graphical widespread with the advent of Apple Macintosh computers in the 1980s, Microsofts first version of Windows-version 1.0-was based upon a GUI interface to the MS-DOS 05, ‘Traditionally, UNIX systems have been dominated by command-line interfaces, although there are Various GUI interfaces available. interfaces became more ‘+The choice of whether to use a command-line oF GUI interface is mostly one of personal preference As a very general rule, many UNIX users prefer a command-linc interface as they often provide powerful shell interfaces ‘+ Alternatively, most Windows users are pleased to use the Windows GUI environment and almost never use the MS-DOS shell interface. 4.11.1 | Windows Windows 7 is an operating system that Microsoft has produced for use on personal computers. It is the follow-up to the Windows Vista Operating System. += The 64-bit version of Windows 7 is now commonly installed on larger client systems, # Design goals are as follows 1. Security 2 Reliabili 3. Application compatibility of windows and POSIX 4. Good performance 5. ty Extensi TECARICAL PUBLICATIONS™- A up tt nowOperating System a 6. Portability 7. Support. + Security : Automatic analysis tools are used to test the security of windows source code. Windows XP receive security certificate (C-2 level Certificate) from US government. It uses Kerberos, access conirol list and packet filtering firewalls to protect the system, + Reliability : Stable and most reliable windows operating system from Microsoft was windows 2000. Windows uses combination of hardware and software protection. Hardware proiection for virtual memory and software protection for operating system resources. + Application compatibility of windows and POSIX: TEE 1003.1 is standard used by POSIX. Without changing source code of windows, user cannot run POSIX application on windows platform. + Performance : Windows XP OS provides high a Overview of Operating Syst method is used for interprocess communication, Windows support preemption of low priority threads enables the system to respond quickly to extemal events. «Extensibility : Extensibility means to support or add new technologies. Windows XP is layered architecture system, Kernel runs in protected mode. ‘An environment subsystems operates in uscr mode providing different APL Portability : Windows XP support portability. Source code of windows XP is in C and Ctr language. Windows 7 OS can be moved from one hardware platform to another with relatively few changes. Platform-cependent code is isolated in a Dynamic Link Library (DLL) called the "Hardware Abstraction Layer" (HAL), 1.41.1] Windows Architecture *Windows architecture consists of hardware abstraction layer, kernel and executive, Fig. 1.11.1 performance for desktop systems. Message passing shows windows XP architecture block diagram. DOs | Teen | [Waren] [rox |_| mee corti nikon] asiesten| [arena] —] Baa User mde. ‘Computer harcware Fig. 4.11.4 Block ram of windows XP architecture TECHNICAL BURLICATIONS™- Aa up tina omeOperating System 1-25 Overview of Operating System + Windows XP architecture is based on microkemol architecture. Tt is modular operating system. Windows XP is also layered operating system. Hardware Abstraction Layer (HAL) + HAL interacts directiy with hardware, abstracting hardware specifies to the rest of the system. HAL Also interacts with the microkemel. The microkernel and the HAL combine to make Windows XP portable allowing it to run in many different hardware environments. HAL js responsible for mapping various low level, processor specific operations into a fixed interface that is used by the XP kernel and executive. + HAL — provides support for symmetric multiprocessing. Device drivers map devices and access them directly. The function of HAL is to present the rest of the operating system with abstract hardware that hides the specific details of processor versions, support chipset and other configurations. HAL does not provide services for specific 1/0 devices such as mouse, keyboards and dicks. Layered on the top of the microkernel are the kemel components responsible for the operating system subsystems Collectively these components are known as the executive. mode administering HAL also manages clocks and timers in a portable way. After booting the system, HAL talks to the BIOS and checks the system configuration to find out which buses and YO devices the system contains and how they have been configured. Kornel Layer + Kernel creates basic unit of computation and provides the foundation for multitasking support, The kemel provides objects and threads on top of the HAL and the hardware, Software that uses the kernel can be defined using objects and threads as primitives, + Functions of kernel Thread scheduling, Interrupt and execution handling Low level processor synchronization Recovery after power failure, ¥ + To imploment objects and threads, the kemel must manage the hardware interrupts and exceptions, perform processor scheduling and handle multiprocessor synchronization. +The kemel's thread scheduler is responsible for determining which thread is executing on each CPU in the system, When switching from one thread to another thread, the scheduler runs on the CPU and ensures that the registers and other hardware state ‘have been saved. + Thread state are ready, standby, running, waiting, transition and terminated. The dispatcher uses a 32 level priority scheme to determine the order of thread execution, Priorities are of two types: real time class and variable class, + As in multiplelevel queue scheduler, as long as there are threads in the highest priority queue, then only those threads will be allocated the processor. If there is no thread in that queue, then the scheduler will service the threads in the second highest priority queue, ‘in the second highest priority queue, threads are not in the ready state, the scheduler will service the third highest priority queue and so on. + Windows XP is not a real time system and cannot guarantee that threads running at high priority will receive the processor before any fixed deadline. + Kemel is object oriented. Kernel objects are intended to be fast. They run in supervisor mode in the ‘rusted context. + Kemel object cannot be manipulated directly by user mode programs, only through function calls + Kemel objects are of two types : Control object and dispatcher object. + Control object implement mechanism to control the hardware and kernel resources. Control objects are data structures that the Kemel layer provides as abstractions to the executive layer for managing the PU. + Dispatcher objects are used to implement threads along with their scheduling and synchronization operations, sln windows, objecis may be either named or unnamed. TECHICAL PLBLICATIONS"- ny Yt keeOperating Systean 1 25 Overview of Operating System, Software Interrupts + Software interrupts are of two types : Asynchronous and deferred procedure call. 1. Asynchronous Procedure Call (APC) + APC execute in the context of a specific thread, APC is used to break into the execution of a specified thread and to cause @ procedure to be called in a specified processor mode. +The system uses APCs to complete various functions that must be done in a specific threads context. Each thread maintains two APC queues : One for kemel mode and another for user mode APC, + Software interrupts that are generated by kernel ‘mode components are the kernel mode APC. After allocating processor, thread must process all pending kernel mode APC. + User mode thread can create a user APC request to queue this APC to another thread. A thread executes user mode APCs when the thread enters an alertable wait state, + User mode APC can also be used to deliver notification of /)O completion in user mode to the Udiread that initiated the VO. 2. Deferred Procedure Call (DPC) + DPCs are software interrupts. They execute at dispatch interrupt request levels (IROL). DPC are used to postpone interrupt processing to avoid delaying hardware interrupts. *DPC is also used to implements timers and inter process communication. + When device driver generates a DPC, the system places the DPC in a queue associated with a specific processor. The driver routine can request a processor to which the DPC should be queued. If processor is not specified, the processor queues the DPC to itself. The routine can also specify the DEC priority. and Object Manager «+ Object manager is the executive components. ‘+ In Windows XP, each object is defined by an object type. Object types are created by executive components. The object manager maintains the windows XP internal name space. * Object types in windows XP include devices, files, threads, processes, pipes, semaphores etc. each windows XP object is an instance of an object type. +The object manager is responsible for creating and deleting objects and maintaining information about each object type Virtual Memory Manager (VMM) + Windows XP allocates a unique 4 GB virtual address space to each process. By default, a process can access only the first 2 GB of its virtual address space. The remaining 2 GB address space is used for kemel components and this is called as system space. *Virtual memory manager uses. a two level hierarchical addressing, system. Windows XP divides vvirkual memory into fixed size pages which it stores either in page frames in main memory or files on disk + Virtual memory manager assigns each process one page directory table. The page directory table contains page directory ontries. + Each page directory entries points to a page table. Page tables contain page table entries. Each page table entries points to @ page frame in main ‘memory of a location on disk + VMM uses copy on write pages and employs lazy allocation. Windows XP_ allows applications to allocate large pages. Large page is a sot of contiguous pages. Operating system consider this as fone page. The system manages copy on write pages using prototype page tables. Memory Allocation + Memory allocation is in three stages : 1 Reserve 2. Commit 3. Access a. A process must first reserve space in its virtual address space. B.A process may not access space it has reserved until it commits the space. Process usually commits a page only when it is read to write to the page t TEGANICAL PUBLICATIONS Ar apart‘ moweceOperating System La Overview of Operating Syste When a process is ready to use its committed memory, it accesses the committed virtual ‘memory. Process Ma «Process consists of program code, an. execution context, resources and one or more threads. Process manger provides services for creating, deleting and using processes and threads. Process and threads is the object. Windows processes are implemented as objects. Both process and thread objects have built in synchronization capabilities 1.12 | Two Marks Questions with Answers Qi Define operating Stam ‘Ans.: An operating system is a program that manages the computer hardware, Q2 What are the objective of operating systems ? ans ‘The objective of operating systems are eificient use, user convenience, ability to evolve. 3 Explain what is batch processing Ans. Here jobs with similar requirements are batched together and run through the computer as a group. Thus a batch operating system reads a stream of separate jobs, each with its own control cards that predefine what the job docs, feed the batches one afier another and send the output of cach job to the appropriate destination. 4 What is spooling ? Ans.: ‘The use of secondary memory as buffer storage to reduce processing delays when transferring data between peripheral equipment and the processors of a computer. @5 Define she dearee of mutiorogramming Ans.: Degree of multiprogramming isthe umber of processes in the memory. 6 — What is meant by “hard real systems and soft real systems”? ‘Ans, Hard real systems guarantee that critical tasks complete on time, In Soft real system a critical task get priority over other tasks and remains that priority until it completes. Q7 Wht 1s the main ‘multiprogramming ? advontege of ‘Ans.: Multiprogramming makes efficient use of the CPU by overlapping the demands for the CPU and its YO devices from various users Tt attempts to increase CPU utilization by always having something for the CPU to execute Q8 What are the three main purposes of an operating system ? Ans. + + To provide an environment for a computer user to execute programs on computer hardware in a ‘convenient and efficient manner. + To allocate the separate resources of the computer as needed to solve the problem given ‘The allocation process should be as fair and efficient as possible As a control program it serves two major functions : 1) Supervision of the execution of user programs to prevent errors and improper use of the computer and 2) Management of the operation and control of /O devices. 9 Define real time system ‘Ans. : Real time system is one that must react to inputs and responds to them quickly. A real time system hes well defined, fixed time constraints. @.10 What do you mean by multisrogramming ? Ans.: Multiprogramming increases. CPU utilization by organizing jobs so that the CPU always hes one to execute. Q11 Wirte the difference between betch system and time sharing systems Ans. “A. batch system executes jobs, whereas a time-shared system has user programs, or tasks, «Batch systems are inconvenient for users because users cannot interact with their jobs to fix problems. User interacts with system in time sharing system, * IECHHICAL PUBLICATIONS". pti mttneOperating System Overview of Operating System Q.12 What is command interpreter system ? ‘Ans. ; Command-Interpreter system is a system rogram, which is the interface between the user and the operating system. Command-interproter system is known as the shell, @.13 List any four services provided by operating system. Ans. ; Services provided by operating systems are program execution, I/O operations, File system ‘manipulation, Communication, Error detection and. resource allocation. Q.14 Define UNIX operating system Ans: UNIX is a multi-user, multi-tasking operating system. Multiple users may have ‘multiple tasks running simultaneously, UNIX is a ‘machine independent operating system Q45 What is booting process ? ‘Ans.: When the computer is switched on, it activates the memory-resident code which resides fon the CPU board. The normal facilities of the operating system are not available at this stage and the computer must ‘pull itself up by its own boot-straps' so to speak, This procedure therefore is often referred to as bootstrapping, aQoa0 ¥- TECHNICAL PUBLICATIONS". An uptime komen‘UNIT - I SERVICES AND COMPONENTS OF OPERATING SYSTEM [221] piterent services of Operating System + Operating system provides different types of services to different users. It provides services to program like load of data into memory, allocating disk for storage, files or directory for open or read etc = Services will change according to the operating system. May be the two different operating system provides same type of services with different names. OS makes programmer job easy by providing different services +Following are the list of services provided by operating systems : Program execution input-output operation Error detection File and directory operation Communication Graphical User Interface 1. Program execution : Before executing the program, it is loaded into the memory by operating system. Once program loads into ‘memory, its start execution. Progcam finishes its execution with error or without error. It is up to the user for next operation. 2. Input - output operation : Program is combination of input and output. statement, While executing the program, it requires /O device. OS provides the W/O devices to the program, 3. Error detection : Error is related to the memory, CPU, YO device and in the user program, Memory is full, stack overilow, file not found, directory not exist, printer is not ready, attempt to access illegal memory are the example of error detection. 4. File and directory operation : User wants to read and writes the file and directory. User wants to search the file/directory, rename file, and modity the file etc, user also create the file or directory, ‘All these operation is performed by user by using help of operating system. 5. Communication : Communication may be inter-process communication and any other type of communication. Data transfer is one type of communication. Communication is in between two process of same machine or two process of different machine. Pipe, shared memory, socket and message passing are the different methods of communication. 6. Graphical user interface : User interacts with operating system by using user interface. All operating system provides user _interface. Command line interface and batch interface are two types of user interface used in the operating system. In command line interface, user enters the text command for performing operation Batch interface uses files. A file contains the command for various operations. When file executes, command output is displayed on the screen + All above services provided by operating system is only for single user. if suppose there are multiple user in the sysiem, then operating system provides ome additional services, These services are resource allocation, accounting, protection of data and security epOperating System + Different types of resources are managed by the operating system. Multiple users require different resource for their execution. One type of resource may be required by two different users. So resource allocation is necessary. + Accounting means keeping information of resources and users. Which types of resources are allocated to which user and whether particular user has permission for using this type of resources. Board Questions ‘LIEV aay se (avalon poeta apa syaer. Deve degra shoring series 2, List any four operating system services amd describ oulboo sentences, 3. Usk and sate any four serles provided by operating system. 4 Gide ea ti eis ‘penite y-an oporaing «yom AS TOI Listy four series provided by OS end explain any 0 tem, & Explain foiocing, too series of persing end i) le sytem manipulation i) Resource Allocation [22] system cans + System calls provide the interface between a running program and the operating system Any single CPU computer can execute only one instruction at a time. If a process is running a user program in user mode and needs a system service, such as reading a data from a file, it has to execute a trap instruction to transfer control to the operating, system. ‘+ Operating system provides services and system call provides interface to these services. System call is written in language C and CH as routines. System calls are performed in a series of steps. + System call is @ technique by which a program executing in user mode can request the kernel’s service, Services and Components of Operating System + An application programmer interface is a function definition that specifies how to obtain a given + Fig. 22.1 shows the working of system call. x Fig, 2.2.4 Working of system call = When application program calls the stub, trap instruction is executed and CPU switches to supervisor mode. Each system all contains its identification number. 08 maintains the table of system call number Operating system executes the system call using that number. ‘When the function completes, it switches the processor to user mode and then returns control to the user process ©. system call is an explicit request to the kemel mode via a software interrupt, When user mode process invokes a system call, the CPU switches to Kernel mode and starts the execution of the kernel function. ‘+ Making a system call is ike making a special kind of procedure call. Only system call enters the kernel and procedure call does not enter into the kernal ‘+ Kernel implements many different types of system calls. The user mode process must pass a parameter called the system call number to identify the required system call. All system calls return an integer value. In the kernel, positive or 0 values denote a successful termination of the system call and negative values denote an error condition * TECHRICAL PUBLICATIONS fo up Pet omtcaeOperating System 2 2 Services and Componcnis of Operating Systems An API does not necessarily correspond to a specific system calls. 1. API could offer its services directly in user mode. 2. Single API function could make several system calls. 3. Several API functions could make the same system call + APL supports a set of functions for application programmer, It includes pessing parameter to each function and rofum values. API used by application programmer are as follows 1. Windows system : win32 API 2. POSIX system : POSIX API 3. Virtual machine : Java API + User function uses trap instruction for using kernel services. Application programmer uses ordinary procedure call. Operating system provides a library of user functions with name corresponding to each actual system call. Each of these stub function contains a trap to the operating system function. «Trap is also called system call interiace. + Three general methods are used to pass parameters to the operating system, a. Pass parameters in registers b. Registers pass starting addresses of blocks of parameters Parameters can be placed, or pushed, onto the stack by the program, anc popped off the stack by the OS + Fig, 222 shows passing of parameters as a table, User program Operating eystem Fig, 2.2.2 Passing of parameters 224 Classification of System Call + System call is divided into following types 1. File management Process management Interprocess communication YO device management Information processing and maintenance 4, File management ‘Tile management system calls are create file, delete file, open file, close file, read file, write fle, get and set file attribute + User can create a file using create( ) system call. File name with attributes are required for creating and eleting a file through system cell. After creating a file, user can pesforms various operations on the file. Read, write, reposition are the operation performed on the file. File is closed after finished using. Same type of operation is performed on directory. + Every file hes file attributes. File attributes includes name of file, type of file, accounting information ete. To perform any operation on the file, set file attribute and get file aitribute executed to check the attributes 2, Process management «System calls for process management are create, terminate, load, execute, abort, set and get process attributes. Other system call for process management is wait for time, wait event, allocate and free memory. In some situation user want to terminate the currently running process abnormally then system call used, Other reasons for abnormal process termination are error message generated, memory dump, error trap. + Operating system provides debugging facility to determine the problem of dump. Dump is written to secondary storage disk. = Debugger is a one type of system program. It provides facility for finding and correcting bug. TECAICAL PUBLICATIONS" a wp rt or knew
You might also like
Advanced Computer Networking (Nirali Publications)
PDF
50% (2)
Advanced Computer Networking (Nirali Publications)
102 pages
Analysis of Algorithm by Techknowledge
PDF
100% (2)
Analysis of Algorithm by Techknowledge
219 pages
OSY Nirali
PDF
80% (5)
OSY Nirali
16 pages
DM Solved Question Paper by Imp Notes Se Comp Sppu
PDF
No ratings yet
DM Solved Question Paper by Imp Notes Se Comp Sppu
10 pages
Software Testing Nirali
PDF
50% (2)
Software Testing Nirali
138 pages
Environmental Studies Technical Publication
PDF
0% (1)
Environmental Studies Technical Publication
128 pages
DSGT TechNeo
PDF
50% (2)
DSGT TechNeo
226 pages
SE Decode
PDF
No ratings yet
SE Decode
114 pages
Operating Systems by Iresh A. Dhotre
PDF
88% (8)
Operating Systems by Iresh A. Dhotre
259 pages
Nov - Dec - OOPs Solved Question Papers - 2019 Pattern
PDF
No ratings yet
Nov - Dec - OOPs Solved Question Papers - 2019 Pattern
49 pages
OSY Unit Wise QBank
PDF
100% (3)
OSY Unit Wise QBank
6 pages
Theory of Computation Technical Book 2021
PDF
100% (1)
Theory of Computation Technical Book 2021
341 pages
Operating System (Nirali Publication)
PDF
50% (4)
Operating System (Nirali Publication)
90 pages
Fundamentals of Data Structures - A. A. Puntambekar
PDF
No ratings yet
Fundamentals of Data Structures - A. A. Puntambekar
132 pages
Programming With Python by Anuradha A. Puntambekar and Yogesh B. Patil
PDF
100% (2)
Programming With Python by Anuradha A. Puntambekar and Yogesh B. Patil
184 pages
Nis 6sem Tech Knowledge
PDF
71% (14)
Nis 6sem Tech Knowledge
141 pages
AOA
PDF
100% (1)
AOA
219 pages
CG Decode
PDF
100% (1)
CG Decode
93 pages
DELD TechKnowledge
PDF
75% (4)
DELD TechKnowledge
373 pages
Mad (Nirali Publi) Book PDF
PDF
100% (4)
Mad (Nirali Publi) Book PDF
206 pages
Software Testing Technical Publication PDF
PDF
90% (10)
Software Testing Technical Publication PDF
91 pages
Discrete Mathematics: Technical
PDF
100% (1)
Discrete Mathematics: Technical
518 pages
(DBMS) Database Management System Text Book
PDF
No ratings yet
(DBMS) Database Management System Text Book
296 pages
Advanced Computer Networking (Tech Neo Publications)
PDF
50% (2)
Advanced Computer Networking (Tech Neo Publications)
78 pages
Ajp Book Tech
PDF
No ratings yet
Ajp Book Tech
320 pages
OOP TechKnowledge
PDF
No ratings yet
OOP TechKnowledge
186 pages
NIS (Tech) Book
PDF
No ratings yet
NIS (Tech) Book
130 pages
Microprocessor Module-5 Question Answers
PDF
No ratings yet
Microprocessor Module-5 Question Answers
8 pages
Dbms Nirali Pub
PDF
No ratings yet
Dbms Nirali Pub
117 pages
FDS IN SEM Decode
PDF
No ratings yet
FDS IN SEM Decode
25 pages
Dsa Sppu PDF
PDF
No ratings yet
Dsa Sppu PDF
617 pages
CG Unit 1 Tech-Neo
PDF
No ratings yet
CG Unit 1 Tech-Neo
66 pages
Software Testing - Technical Publication
PDF
No ratings yet
Software Testing - Technical Publication
91 pages
Advanced: Java Programming
PDF
0% (1)
Advanced: Java Programming
181 pages
Ste Nirali Book
PDF
No ratings yet
Ste Nirali Book
138 pages
DLCA TechNeo
PDF
No ratings yet
DLCA TechNeo
285 pages
MAD Textbook
PDF
No ratings yet
MAD Textbook
116 pages
Java Programming For MSBTE I Scheme (IV - Comp. - 2
PDF
100% (1)
Java Programming For MSBTE I Scheme (IV - Comp. - 2
166 pages
Cloud Techmax
PDF
No ratings yet
Cloud Techmax
125 pages
Solved Os Sppu Q - Paper
PDF
0% (1)
Solved Os Sppu Q - Paper
19 pages
04 Chapter-05 Register Organization
PDF
No ratings yet
04 Chapter-05 Register Organization
3 pages
Data Communication Computer Network For MSBTE I
PDF
No ratings yet
Data Communication Computer Network For MSBTE I
138 pages
Practical No. 9: Technique
PDF
No ratings yet
Practical No. 9: Technique
11 pages
SKMBT C22021032313190
PDF
100% (3)
SKMBT C22021032313190
236 pages
(DM) Discrete Mathematics Text Book (2019 Pattern)
PDF
100% (1)
(DM) Discrete Mathematics Text Book (2019 Pattern)
130 pages
Operating System (Decode)
PDF
No ratings yet
Operating System (Decode)
117 pages
PWP 22616 Epa
PDF
No ratings yet
PWP 22616 Epa
77 pages
Mad Viva Questions
PDF
100% (1)
Mad Viva Questions
5 pages
WMN Book
PDF
No ratings yet
WMN Book
170 pages
OSY Chapter 1 To 6 Notes
PDF
No ratings yet
OSY Chapter 1 To 6 Notes
98 pages
Dsu 22317 Notes
PDF
No ratings yet
Dsu 22317 Notes
92 pages
V2V OSY Super 25 Questions Solution
PDF
No ratings yet
V2V OSY Super 25 Questions Solution
24 pages
NIS Practical PDF
PDF
No ratings yet
NIS Practical PDF
36 pages
IF CO-PO Mapping
PDF
50% (2)
IF CO-PO Mapping
22 pages
Osy MP
PDF
No ratings yet
Osy MP
16 pages
Client Side Scripting Language - 22519-Ifinal
PDF
No ratings yet
Client Side Scripting Language - 22519-Ifinal
183 pages
Python Vol 1 - Technical Publication
PDF
No ratings yet
Python Vol 1 - Technical Publication
81 pages
Osy 22516 Microproject
PDF
100% (1)
Osy 22516 Microproject
15 pages
Operating System-Sample-Question-Paper Msbte-Study-Resources PDF
PDF
100% (1)
Operating System-Sample-Question-Paper Msbte-Study-Resources PDF
4 pages
OS Book Basic To Advance
PDF
No ratings yet
OS Book Basic To Advance
141 pages
OSY Lecture 1 Notes - MSBTE NEXT ICON
PDF
No ratings yet
OSY Lecture 1 Notes - MSBTE NEXT ICON
14 pages
OSY Lecture 2 Notes - MSBTE NEXT ICON
PDF
No ratings yet
OSY Lecture 2 Notes - MSBTE NEXT ICON
11 pages
OSY Lecture 2.2 Notes - MSBTE NEXT ICON
PDF
No ratings yet
OSY Lecture 2.2 Notes - MSBTE NEXT ICON
5 pages
Excel
PDF
No ratings yet
Excel
10 pages
Mic Solved Manual 1
PDF
No ratings yet
Mic Solved Manual 1
81 pages
Lower Case To Upper Case (MIC)
PDF
100% (1)
Lower Case To Upper Case (MIC)
12 pages