Escolar Documentos
Profissional Documentos
Cultura Documentos
Operating Systems
Slide 1 of 20
Storage Hierarchy
Primary storage: memory
Operating Systems
Storage Management
OS provides a uniform, logical view of information storage Logical storage unit abstraction: file
Maps onto physical media (e.g, magnetic disk, optical disk) Unique properties of physical media (access speed, capacity, transfer rate, sequential/random)
Operating Systems
Creating and deleting files Creating and deleting directories Supporting primitives for manipulating files and directories Mapping files onto secondary storage Storing files to non-volatile storage medium
Slide 4 of 20
Operating Systems
Mass-Storage Management
Main memory cannot hold all programs It's also volatile Computer must provide secondary storage for when power is lost
Modern computers use HDD as principal non-volatile storage Most programs stored on HDD Then use it as source & destination of their processing
Slide 5 of 20
Operating Systems
Operating Systems
Slide 6 of 20
Faster
Cache (SRAM)
Greater Capacity
Caching
Tries to hide/bridge speed differences Information for CPU kept in storage medium usually memory Needs to be transferred to faster storage (cache) To use data
Check if in cache If yes, use it If no, fetch from memory & also copy to cache
Slide 8 of 20
Operating Systems
Caching (2)
Some caches implemented totally in hardware (e.g., instruction cache) Cache size is limited, so cache management important Main memory acts as cache for secondary storage
Slide 9 of 20
Operating Systems
Caching (3)
File-system data may appear at several levels in storage hierarchy Solid State Disks (SSD) as add-on to or replacement for HDD Movement of data either explicit or implicit
Operating Systems
Protection
Protection is a mechanism for controlling access of users and processes to computer resources
E.g., process can only access memory allocated to it Timer stops runaway processes
Operating Systems
Slide 11 of 20
Security
Security is trying to defend a system from internal or external attacks
Viruses, worms Denial of Service (DOS) attacks Identity theft Theft of service (unauthorized use)
Operating Systems
Slide 12 of 20
Process runs with UID of person that started it This determines access to system resources
Group identifiers (GID) E.g., for installing software When escalated, process runs with effective UID
Slide 13 of 20
Operating Systems
Distributed Systems
A collection of physically separate, possibly heterogeneous computers, networked to provide access to system resources
Access to a shared resource improves speed, functionality, data availability, reliability Network Operating System provides features like sharing files across network, inter-process communication across computers
Slide 14 of 20
Operating Systems
Special-Purpose Systems
Real-time systems
Primitive Limited, fixed functionality Time limits on operations Optimized for multimedia Optimized for mobility, low power & unreliable connections
Slide 15 of 20
Multimedia systems
Handheld systems
Operating Systems
Computing Environments
Operating Systems
Slide 16 of 20
Traditional Computing
Started off as self-contained computers & networks Low portability Remote access difficult Home computing was simple, limited
Now expanding to include networks & shared devices (e.g., printers) Same techniques used in newer multitasking systems
Operating Systems
Slide 17 of 20
Client-Server Computing
Client 1 Client 2 Client 3 Client n
Server
Service request sent to server Server does processing Results returned to client
Operating Systems
Peer-to-Peer Computing
Join network of peers Provide service to peers Request service from peers
Centralized registry of service providers Or discovery-based service provisioning No central point of failure/bottleneck
Slide 19 of 20
Operating Systems
Web-based Computing
The Web has become ubiquitous Increased emphasis on networking Anytime, anywhere access Best/most extreme example?
Chrome OS
Operating Systems
Slide 20 of 20