SlideShare a Scribd company logo
2
Most read
3
Most read
Introduction to Operating System
S.R INAMDAR1Dept. of CSE BLDEA'S SSM POLYTECHNIC
Chapter 1: Introduction
 What Operating Systems Do
 Computer-System Architecture
 Operating-System Structure
 Operating-System Operations
 Process Management
 Memory Management
 Storage Management
 Protection and Security
 Distributed Systems
 Special-Purpose Systems
 Computing Environments
 Open-source Operating Systems.
2Dept. of CSE BLDEA'S SSM POLYTECHNIC
What is an Operating System?
 A program that acts as an intermediary between a user of a
computer and the computer hardware.
 Operating system goals:
 Execute user programs and make solving user problems
easier.
 Make the computer system convenient to use.
 Use the computer hardware in an efficient manner.
3Dept. of CSE BLDEA'S SSM POLYTECHNIC
Operating System Definition
 OS is a resource allocator
 Manages all resources
 Decides between conflicting requests for efficient and fair
resource use
 OS is a control program
 Controls execution of programs to prevent errors and
improper use of the computer
4Dept. of CSE BLDEA'S SSM POLYTECHNIC
Operating System Structure
Multiprogramming needed for efficiency
 Single user cannot keep CPU and I/O devices busy at all times
 Multiprogramming organizes jobs (code and data) so CPU
always has one to execute
 A subset of total jobs in system is kept in memory
 One job selected and run via job scheduling
 When it has to wait (for I/O for example), OS switches to
another job
5Dept. of CSE BLDEA'S SSM POLYTECHNIC
Operating System Structure (cont.)
 Timesharing (multitasking) is logical extension in which CPU switches
jobs so frequently that users can interact with each job while it is
running, creating interactive computing
 Response time should be < 1 second
 Each user has at least one program executing in memory process
 If several jobs ready to run at the same time  CPU scheduling
 If processes don’t fit in memory, swapping moves them in and out to run
 Virtual memory allows execution of processes not completely in
memory
6Dept. of CSE BLDEA'S SSM POLYTECHNIC
Operating-System Operations
 Interrupt driven by hardware
 Software error or request creates exception or trap
 Division by zero, request for operating system service
 Other process problems include infinite loop, processes
modifying each other or the operating system
7Dept. of CSE BLDEA'S SSM POLYTECHNIC
Operating-System Operations (Cont.)
 Dual-mode operation allows OS to protect itself and other system
components
 User mode and kernel mode
 Mode bit provided by hardware
 Provides ability to distinguish when system is running user
code or kernel code
 Some instructions designated as privileged, only executable in
kernel mode
 System call changes mode to kernel, return from call resets it to
user
8Dept. of CSE BLDEA'S SSM POLYTECHNIC
Process Management Activities
The operating system is responsible for the following
activities in connection with process management:
 Creating and deleting both user and system processes
 Suspending and resuming processes
 Providing mechanisms for process synchronization
 Providing mechanisms for process communication
 Providing mechanisms for deadlock handling
9Dept. of CSE BLDEA'S SSM POLYTECHNIC
Memory Management
 Memory management activities
 Keeping track of which parts of memory are currently being
used and by whom
 Deciding which processes (or parts thereof) and data to
move into and out of memory
 Allocating and deallocating memory space as needed
10Dept. of CSE BLDEA'S SSM POLYTECHNIC
Storage Management
 OS activities include
 Creating and deleting files and directories
 Primitives to manipulate files and disc
 Mapping files onto secondary storage
 Backup files onto stable (non-volatile) storage media
11Dept. of CSE BLDEA'S SSM POLYTECHNIC
Mass-Storage Management
 OS activities
 Free-space management
 Storage allocation
 Disk scheduling
12Dept. of CSE BLDEA'S SSM POLYTECHNIC
Protection and Security
 Protection – any mechanism for controlling access of processes or users to
resources defined by the OS
 Security – defense of the system against internal and external attacks
 Huge range, including denial-of-service, worms, viruses, identity theft, theft of
service
 Systems generally first distinguish among users, to determine who can do what
 User identities (user IDs, security IDs) include name and associated number, one per
user
 User ID then associated with all files, processes of that user to determine access
control
 Group identifier (group ID) allows set of users to be defined and controls managed,
then also associated with each process, file
 Privilege escalation allows user to change to effective ID with more rights
13Dept. of CSE BLDEA'S SSM POLYTECHNIC
Computing Environments
 Traditional computer
 Blurring over time
 Office environment
 PCs connected to a network, terminals attached to mainframe or
minicomputers providing batch and timesharing
 Now portals allowing networked and remote systems access to same
resources
 Home networks
 Used to be single system, then modems
 Now firewalled, networked
14Dept. of CSE BLDEA'S SSM POLYTECHNIC
Client-Server Computing
 Dumb terminals supplanted by smart PCs
 Many systems now servers, responding to requests generated by
clients
 Compute-server provides an interface to client to request services
(i.e. database)
 File-server provides interface for clients to store and retrieve files
15Dept. of CSE BLDEA'S SSM POLYTECHNIC
Peer-to-Peer Computing
 Another model of distributed system
 P2P does not distinguish clients and servers
 Instead all nodes are considered peers
 May each act as client, server or both
 Node must join P2P network
 Registers its service with central lookup service on network, or
 Broadcast request for service and respond to requests for service
via discovery protocol
 Examples include Napster and Gnutella
16Dept. of CSE BLDEA'S SSM POLYTECHNIC
Web-Based Computing
 Web has become ubiquitous
 PCs most prevalent devices
 More devices becoming networked to allow web access
 New category of devices to manage web traffic among
similar servers: load balancers
 Use of operating systems like Windows 95, client-side,
have evolved into Linux and Windows XP, which can be
clients and servers
17Dept. of CSE BLDEA'S SSM POLYTECHNIC
THANK YOU
18Dept. of CSE BLDEA'S SSM POLYTECHNIC

More Related Content

What's hot (20)

PPTX
chapter 1 introduction to operating system
Aisyah Rafiuddin
 
PPTX
Operating System - Types Of Operating System Unit-1
abhinav baba
 
PPT
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci
 
PPTX
Software maintenance
Rajeev Sharan
 
PPTX
Client server model
Gd Goenka University
 
PPTX
UNIX Operating System ppt
OECLIB Odisha Electronics Control Library
 
PPTX
Comparative Analysis of Windows and Linux System
Kazi Emad
 
PDF
operating system structure
Waseem Ud Din Farooqui
 
PPT
Linux os and its features
Kadiresan Nagarattiname
 
PPT
Operating Systems
Mohamed Loey
 
PPT
Linux Advantages and Disadvantages
SHUBHA CHATURVEDI
 
PPT
An Introduction to Operating Systems
BitNation Technology Studio
 
ODP
Operating Systems
Dasun Hegoda
 
PPTX
Data Designs (Software Engg.)
Arun Shukla
 
PPT
How to install windows 10
Annu Ahmed
 
PPT
1. Introduction to DBMS
koolkampus
 
PPTX
File management
Vishal Singh
 
PPTX
types of operating system
Mahira Rashdi
 
PPTX
Multiprocessor
Kamal Acharya
 
chapter 1 introduction to operating system
Aisyah Rafiuddin
 
Operating System - Types Of Operating System Unit-1
abhinav baba
 
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci
 
Software maintenance
Rajeev Sharan
 
Client server model
Gd Goenka University
 
Comparative Analysis of Windows and Linux System
Kazi Emad
 
operating system structure
Waseem Ud Din Farooqui
 
Linux os and its features
Kadiresan Nagarattiname
 
Operating Systems
Mohamed Loey
 
Linux Advantages and Disadvantages
SHUBHA CHATURVEDI
 
An Introduction to Operating Systems
BitNation Technology Studio
 
Operating Systems
Dasun Hegoda
 
Data Designs (Software Engg.)
Arun Shukla
 
How to install windows 10
Annu Ahmed
 
1. Introduction to DBMS
koolkampus
 
File management
Vishal Singh
 
types of operating system
Mahira Rashdi
 
Multiprocessor
Kamal Acharya
 

Similar to Unit 1 introduction to Operating System (20)

PDF
R20CSE2202-OPERATING-SYSTEMS .pdf
cVan3
 
PPTX
The Fundamentals of Operating Systems .pptx
KevinJohnSRamos
 
PPT
Operating system Lecture no 1. Introduction
ajazbaig5
 
PPTX
Unit 1-Operating Systems Overview .pptx
ThamaraiselviAvinuty
 
PDF
chapter 3 opreating system lecture note and its is impaortamt concept for mn
dejenehundaol91
 
PDF
Csc 2313 (lecture 2)
umardanjumamaiwada
 
PDF
Csc 2313 (lecture 2)
umardanjumamaiwada
 
PPTX
Operating System Introduction.pptx
VijayKumarKandhi1
 
PPTX
CSE3120- Module1 part 1 v1.pptx
akhilagajjala
 
PPTX
introduction to visual basic unit 1.pptx
ManoRanjani30
 
PPTX
Chapter 5
Er. Nawaraj Bhandari
 
PPSX
Operating system
mak120
 
PPT
intro.ppt
raffy ursulum
 
PPT
intro.ppt
susmitapatra19
 
PPTX
The basic fundamentals' of operating system
KevinJohnSRamos
 
PPTX
Operating system-1
jayalakshmi268
 
PPT
Introduction to Operating Systems - Mary Margarat
Mary Margarat
 
DOC
Module1
dilshad begum
 
PPTX
Operating System Introduction
Sravani Kommuri
 
R20CSE2202-OPERATING-SYSTEMS .pdf
cVan3
 
The Fundamentals of Operating Systems .pptx
KevinJohnSRamos
 
Operating system Lecture no 1. Introduction
ajazbaig5
 
Unit 1-Operating Systems Overview .pptx
ThamaraiselviAvinuty
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
dejenehundaol91
 
Csc 2313 (lecture 2)
umardanjumamaiwada
 
Csc 2313 (lecture 2)
umardanjumamaiwada
 
Operating System Introduction.pptx
VijayKumarKandhi1
 
CSE3120- Module1 part 1 v1.pptx
akhilagajjala
 
introduction to visual basic unit 1.pptx
ManoRanjani30
 
Operating system
mak120
 
intro.ppt
raffy ursulum
 
intro.ppt
susmitapatra19
 
The basic fundamentals' of operating system
KevinJohnSRamos
 
Operating system-1
jayalakshmi268
 
Introduction to Operating Systems - Mary Margarat
Mary Margarat
 
Module1
dilshad begum
 
Operating System Introduction
Sravani Kommuri
 
Ad

More from zahid7578 (7)

PPTX
Computer_Network_Chapter_2.pptx
zahid7578
 
PPTX
Computer_Network_Chapter_1.pptx
zahid7578
 
PPTX
Operating System Concepts_1.pptx
zahid7578
 
PPTX
Unit ii java script and xhtml documents and dynamic documents with javascript
zahid7578
 
PPTX
Unit 1 introduction to web programming
zahid7578
 
PPTX
Testing level
zahid7578
 
PPTX
Unit 2 process Management
zahid7578
 
Computer_Network_Chapter_2.pptx
zahid7578
 
Computer_Network_Chapter_1.pptx
zahid7578
 
Operating System Concepts_1.pptx
zahid7578
 
Unit ii java script and xhtml documents and dynamic documents with javascript
zahid7578
 
Unit 1 introduction to web programming
zahid7578
 
Testing level
zahid7578
 
Unit 2 process Management
zahid7578
 
Ad

Recently uploaded (20)

PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Python basic programing language for automation
DanialHabibi2
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Python basic programing language for automation
DanialHabibi2
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 

Unit 1 introduction to Operating System

  • 1. Introduction to Operating System S.R INAMDAR1Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 2. Chapter 1: Introduction  What Operating Systems Do  Computer-System Architecture  Operating-System Structure  Operating-System Operations  Process Management  Memory Management  Storage Management  Protection and Security  Distributed Systems  Special-Purpose Systems  Computing Environments  Open-source Operating Systems. 2Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 3. What is an Operating System?  A program that acts as an intermediary between a user of a computer and the computer hardware.  Operating system goals:  Execute user programs and make solving user problems easier.  Make the computer system convenient to use.  Use the computer hardware in an efficient manner. 3Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 4. Operating System Definition  OS is a resource allocator  Manages all resources  Decides between conflicting requests for efficient and fair resource use  OS is a control program  Controls execution of programs to prevent errors and improper use of the computer 4Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 5. Operating System Structure Multiprogramming needed for efficiency  Single user cannot keep CPU and I/O devices busy at all times  Multiprogramming organizes jobs (code and data) so CPU always has one to execute  A subset of total jobs in system is kept in memory  One job selected and run via job scheduling  When it has to wait (for I/O for example), OS switches to another job 5Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 6. Operating System Structure (cont.)  Timesharing (multitasking) is logical extension in which CPU switches jobs so frequently that users can interact with each job while it is running, creating interactive computing  Response time should be < 1 second  Each user has at least one program executing in memory process  If several jobs ready to run at the same time  CPU scheduling  If processes don’t fit in memory, swapping moves them in and out to run  Virtual memory allows execution of processes not completely in memory 6Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 7. Operating-System Operations  Interrupt driven by hardware  Software error or request creates exception or trap  Division by zero, request for operating system service  Other process problems include infinite loop, processes modifying each other or the operating system 7Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 8. Operating-System Operations (Cont.)  Dual-mode operation allows OS to protect itself and other system components  User mode and kernel mode  Mode bit provided by hardware  Provides ability to distinguish when system is running user code or kernel code  Some instructions designated as privileged, only executable in kernel mode  System call changes mode to kernel, return from call resets it to user 8Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 9. Process Management Activities The operating system is responsible for the following activities in connection with process management:  Creating and deleting both user and system processes  Suspending and resuming processes  Providing mechanisms for process synchronization  Providing mechanisms for process communication  Providing mechanisms for deadlock handling 9Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 10. Memory Management  Memory management activities  Keeping track of which parts of memory are currently being used and by whom  Deciding which processes (or parts thereof) and data to move into and out of memory  Allocating and deallocating memory space as needed 10Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 11. Storage Management  OS activities include  Creating and deleting files and directories  Primitives to manipulate files and disc  Mapping files onto secondary storage  Backup files onto stable (non-volatile) storage media 11Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 12. Mass-Storage Management  OS activities  Free-space management  Storage allocation  Disk scheduling 12Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 13. Protection and Security  Protection – any mechanism for controlling access of processes or users to resources defined by the OS  Security – defense of the system against internal and external attacks  Huge range, including denial-of-service, worms, viruses, identity theft, theft of service  Systems generally first distinguish among users, to determine who can do what  User identities (user IDs, security IDs) include name and associated number, one per user  User ID then associated with all files, processes of that user to determine access control  Group identifier (group ID) allows set of users to be defined and controls managed, then also associated with each process, file  Privilege escalation allows user to change to effective ID with more rights 13Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 14. Computing Environments  Traditional computer  Blurring over time  Office environment  PCs connected to a network, terminals attached to mainframe or minicomputers providing batch and timesharing  Now portals allowing networked and remote systems access to same resources  Home networks  Used to be single system, then modems  Now firewalled, networked 14Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 15. Client-Server Computing  Dumb terminals supplanted by smart PCs  Many systems now servers, responding to requests generated by clients  Compute-server provides an interface to client to request services (i.e. database)  File-server provides interface for clients to store and retrieve files 15Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 16. Peer-to-Peer Computing  Another model of distributed system  P2P does not distinguish clients and servers  Instead all nodes are considered peers  May each act as client, server or both  Node must join P2P network  Registers its service with central lookup service on network, or  Broadcast request for service and respond to requests for service via discovery protocol  Examples include Napster and Gnutella 16Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 17. Web-Based Computing  Web has become ubiquitous  PCs most prevalent devices  More devices becoming networked to allow web access  New category of devices to manage web traffic among similar servers: load balancers  Use of operating systems like Windows 95, client-side, have evolved into Linux and Windows XP, which can be clients and servers 17Dept. of CSE BLDEA'S SSM POLYTECHNIC
  • 18. THANK YOU 18Dept. of CSE BLDEA'S SSM POLYTECHNIC