Você está na página 1de 17

Introduction to Operating

Systems
the intermediary between users and the
computer system.
provides the services and features present in
abstract views of all its users through the
computer system.
enables the services and features to evolve
over time as users needs change.
ABSTRACT VIEWS OF AN OPERATING SYSTEM
A view that takes in only those features that the users interest. For
example,
To a school or college student, the OS is the software that permits
access to the Internet.
To a programmer, the OS is the software that makes it possible to
develop programs on a
computer system.
To a user of an application package, the OS is simply the software
that makes it possible to
use the package.
To a technician in, say, a computerized chemical plant, the OS is
the invisible component of
a computer system that controls the plant.
Designers abstract view of an OS:
GOALS OF AN OS
1. Efficient use: Ensure efficient use of a computers
resources.
minimize the waste of resources and overhead
monitoring use of
resources and performing corrective actions
2. User convenience: Provide convenient methods of using a
computer system.
3. Noninterference: Prevent interference in the activities of
its users.
by allocating resources for exclusive use of programs and
OS services.
act of authorization.
Facets of user convenience
1. Fulfillment of necessity: Ability to execute programs,
use the file system
2. Good Service: Speedy response to computational
requests
3. User friendly interfaces: Easy-to-use commands,
graphical user interface (GUI)
4. New programming model: Concurrent programming
5. Web-oriented features: Means to set up Web-
enabled servers
6. Evolution: Add new features, use new computer
technologies
Common tasks performed by Operating
Systems
Task When performed
Construct a list of resources. During booting
Maintain information for security While registering new users
Verify identity of a user At login time
Initiate execution of programs At user commands

Maintain authorization information When a user specifies which collaborators can


access what programs or data

Perform resource allocation When requested by users or programs

Maintain current status of programs and Continually during OS operation


perform scheduling

Maintain current status of resources During resource allocation/ deallocation


Operation of an OS

1. Program Management

2. Resource Management

3. Security and protection


i) Program Management
The key function in achieving interleaved
execution of programs is scheduling
ii)Resource Management
Performed by using a resource table.
Table contains the name and address of a resource unit and its present
status, indicating whether it is free or allocated to some program.
Constructed by the boot procedure by sensing the presence of I/O devices
in the system, and updated by the operating system to reflect the allocations
and deallocations made by it.

Resource allocation strategies:


1) Resource partitioning approach
2) Pool-based approach.
Virtual Resources:
a fictitious resourceit is an illusion supported
by an OS through use of a real resource
Virtual devices are used in contemporary
operating systems
Virtual memory is an illusion of a memory that
is larger in size than the real memory of a
computer.
Its use enables a programmer to execute a
program whose size may exceed the size of real
memory
iii. Security and protection
The security function counters threats of
illegal use or interference posed by persons
or programs outside the control of an operating
system,

the protection function counters similar


threats posed by its users
Illustration how security and
protection threats arise in an OS
Security and protection
Authentication
OS thwarts disruption of program executions and OS services with the
help of hardware features such as memory protection.
It thwarts interference with files

When connected to internet


A Trojan horse
A virus
A worms,
Operating systems address security threats
through a variety of means
Using sophisticated authentication techniques

By plugging security holes when they are discovered

By ensuring that programs cannot be modified while they are copied over
the internet

By using internet firewalls to filter out unwanted internet traffic through a


computer system.
OS and Computer system

Você também pode gostar