Os Notes

  • Uploaded by: Rahul Kumar
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Os Notes as PDF for free.

More details

  • Words: 3,155
  • Pages: 16
Computer system Architecture A

computer system may be organized in a number of different ways depending on the number of processors used. Single-Processor

Systems Multiprocessor Systems Clustered Systems Single-Processor Systems On

a single-processor system, there is one main CPU capable of executing a general-purpose instruction set, including instructions from user processes. Apart

from this it contains other special processors also. - device specific processors, such as disk, graphics controllers

These

special processors run a limited instruction set and do not run user processes. Sometimes

it is managed by operating system by sending information about their next task and monitors their status. PCs

contain a microprocessor in the keyboard to convert the keystrokes into codes to be sent to the CPU.

In

other systems ,special-purpose processors are low-level components built into the hardware and the operating system cannot communicate with these processors. The

use of special-purpose microprocessors is common and does not turn a single-processor system into a multiprocessor. System

with one general purpose CPU is called a single-processor

system.

Multiprocessor Systems

Multiprocessor

systems (also called as parallel systems or tightly coupled systems) are growing today. It has two or more processors in close communication, sharing the computer bus and sometimes the clock, memory and peripheral devices. Three main advantages: - increased throughput - economy of scale - increased reliability Increased

throughput: - get more work done in less time. - The speed up ratio with N processors is not N, rather it is less than N.

When

multiple processors cooperate on a task, a certain amount of overhead is incurred in keeping all the parts working correctly. This

lowers the expected gain from additional processors.

Economy

of scale: - multiprocessor system can cost less than equivalent multiple single-processor systems

- they can share peripherals, mass storage and power supplies. - it is cheaper to store data on one disk and to have all the processors share them rather to have many computers with local disks and many copies of the data. Increased

reliability - if functions are distributed among several processors, then the failure of one processor will not halt the system, only slow it down. - ten processors, one fails, then remaining nine processors can pick up a share of the work of the failed processor.

Increased

reliability of a computer system is crucial in many applications. The ability to continue providing service proportional to the level of surviving hardware is called graceful degradation. Some system go beyond graceful degradation and are called fault tolerant. - single component may fail but still continue operation. Fault

tolerant requires a mechanism to allow the failure to be detected, diagnosed and if possible corrected. The

multiple-processor systems are of two types, - asymmetric multiprocessing - symmetric multiprocessing (SMP)

asymmetric

multiprocessing, in which each processor is assigned a

specific task. In this a master processor controls the system and the other processors take instruction from master or have predefined tasks. This scheme defines a master-slave relationship. The master processor schedules and allocates work to the slave processors.

symmetric multiprocessing (SMP) In which each processor performs all tasks within the operating system. In SMP all the processors are peers, there is no master-slave relationship. E.g – solaris A solaris system Drawbacks are

can be configured to employ dozens of procesors.

- must ensure that the data reach the appropriate processor. - the CPUs are separate, one may be sitting idle while another is overloaded resulting in inefficiencies. In

this system, the processes and resources are shared dynamically among processors. Now

all operating system provide support for SMP.

A

recent trend in CPU design is to include multiple compute cores on a single chip. Two-way N-way

chips are becoming mainstream.

chips are going to be common in high-end systems

Blade

servers are recent development - in which multiple processor boards, I/O boards and networking boards are placed in the same chasis.

Each

blade processor board boots independently and runs its own operating system.

Clustered systems Clustered

systems gather together multiple CPUs to accomplish computational

work. These

type of system are composed of two or more individual systems coupled together. It

shares the storage and are closely linked via a local area network(LAN).

It

is used to provide high-availability service. - service will continue even if one or more systems in cluster fail.

A

layer of cluster software runs on the cluster nodes.

Each

node can monitor one or more of the others(over the LAN).

If

monitored machine fails, then the monitoring machine can take the ownership. It

can be structured asymmetrically or symmetrically

In

the asymmetric clustering, one machine is in hot-standby mode while the other is running the applications.

The

hot-standby host machine does nothing but monitor the active server. If

the server fails, the hot-standby host becomes the active server.

In

symmetric mode, two or more hosts are running applications, and are monitoring each other. It uses all the available hardware. Other

forms of clusters include parallel clusters and clustering over a wide-area network(WAN) Parallel

clusters allow multiple hosts to access the same data on the shared storage. E.g

oracle parallel server

Process Management A

process is a program in execution. It is a unit of work within the system. E.g

compiler is a process,word processing program is a process,system task ,such as sending output to a printer is a process. Processes

can create subprocesses to execute concurrently.

Process

needs resources to accomplish its task CPU, memory, I/O, files Initialization data The resources are either given to the process when it is created or allocated to it while it is running.

Process

termination requires reclaim of any reusable resources.

Program

is a passive entity, process is an active entity.

Single-threaded

process has one program counter specifying location of next instruction to execute

Process

executes instructions sequentially, one at a time, until completion Multi-threaded

process has multiple program counters,each pointing to the next instruction to execute for a given thread Typically

system has many processes, some user, some operating system running concurrently on one or more CPUs  all these processes can potentially execute concurrently-by multiplexing the CPU among them on a single CPU.

Process Management Activities

The operating system is responsible for the following activities in connection with process management: Creating and deleting both user and system processes Suspending and resuming processes Providing mechanisms for process synchronization Providing mechanisms for process communication Providing mechanisms for deadlock handling

Memory Management Main

memory is a large array of words or bytes, where each word or byte has it own address. Its

a repository where the data can be accessed and shared by the CPU and I/O devices quickly. The

central processor reads instructions from main memory during the instruction fetch cycle. Both

read and write data from main memory during the data-fetch

cycle. The

main memory is the only large storage device that the CPU is able to address and access directly. For e.g. When

a program is executed , it must be mapped to absolute addresses and loaded into memory.

Once

program executes - it accesses program instructions and data from memory by generating these absolute addresses. - when the program terminates,its memory space is freed.

Many

memory management schemes are used to improve the utilization of the CPU. The

selection of memory management scheme depends on the hardware design of the system.

Memory

management activities Keeping track of which parts of memory are currently being used and by whom Deciding

which processes (or parts thereof) and data to move into and out of memory Allocating

and deallocating memory space as needed

Storage Management OS

provides uniform, logical view of information storage Abstracts physical properties to logical storage unit - file Each medium is controlled by device (i.e., disk drive, tape drive)

The

OS maps files onto physical media and accesses these files via the storage devices.

File-System management It

is visible component of an operating system. - information can be stored on different physical medium such as magnetic disk, optical disk and magnetic tape.

Each

of these media has its own characteristics and physical organization and are controlled by a device. - properties include access speed, capacity,data-transfer rate and access method.(sequential or random).

A

file is collection of related information defined by its creator.

Files

represent programs(both source and object forms) and data.

The

OS implements the abstract concept of a file by managing mass storage media such as tapes and disks and the devices that control them. Files

are normally organized into directories to make them easier to

use. Multiple users can access the files, desirable control should be provided to access the files. OS

activities in connection with file management Creating and deleting files and directories Primitives to manipulate files and directories Mapping files onto secondary storage Backup files onto stable (non-volatile) storage media.

Mass-Storage Management Usually

disks used to store data that does not fit in main memory or data that must be kept for a “long” period of time. Most

programs – including compliers, assemblers, word processors are stored on a disk until loaded into memory and then use the disk as both the source and destination of their processing. Proper

management of disk storage is of central importance.

Entire

speed of computer operation hinges on disk subsystem and its algorithms OS

activities in connection with disk management Free-space management Storage allocation Disk scheduling

Some

storage need not be fast(but higher capacity Tertiary storage devices like optical storage, magnetic tape,CD and DVD drivers,platters. The media Varies between WORM (write-once, read-manytimes) and RW (read-write) formats.

Some

of the functions that operating systems can provide include mounting and unmounting media in devices, allocating and freeing the devices for exclusive use by processes and migrating data from secondary to tertiary storage.

Caching Important

principle, performed at many levels in a computer (in hardware, operating system, software) Information in use is copied from slower (storage medium) to faster storage system (cache) temporarily Faster storage (cache) checked first to determine if information is there If it is, information used directly from the cache (fast) If not, data copied to cache and used there The

internal programmable registers, such as index registers, provide a high-speed cache for main memory. There

are caches that are implemented totally in hardware. - most systems have an instruction cache to hold the next instructions expected to be executed. - without this cache the CPU has to wait for several cycles. Caches have limited size, Cache management important design problem Careful selection of the Cache size and replacement policy will increase performance.

Performance of Various Levels of Storage

Movement

between levels of storage hierarchy can be explicit or implicit, depending on the hardware design and the controlling operating system software. For

e.g data transfer from cache to CPU and registers is usually a hardware function. but transfer of data from disk to memory is usually controlled by the OS.

In

a hierarchical storage structure, the same data may appear in different levels of the storage system. For

e.g an integer A that is to be incremented by 1 is located in file B and file B resides on magnetic disk.

Migration of Integer A from Disk to Register Multitasking

environments must be careful to use most recent value, no matter where it is stored in the storage hierarchy Multiprocessor

environment must provide cache coherency in hardware such that all CPUs have the most recent value in their cache Distributed environment situation even more complex Several copies of a data can exist Various solutions covered in Chapter 17

I/O Subsystem One

purpose of OS is to hide peculiarities of hardware devices from the user I/O subsystem responsible for Memory management of I/O including buffering (storing data temporarily while it is being transferred), caching (storing parts of data in faster storage for performance), spooling (the overlapping of output of one job with input of other jobs) General device-driver interface Drivers for specific hardware devices Only

the device driver knows the peculiarities of the specific device to which it is assigned.

Protection and Security

If

the system has multiple user and allows the concurrent execution of multiple processes, then access to data must be regulated. The resources can be operated on by only those processes that have gained proper authorization from the OS. For e.g, - memory-addressing hardware ensures that a process can execute only within its own address space. - device-control registers are not accessible to users, so the integrity of the various peripheral devices is protected. Protection

– any mechanism for controlling access of processes or users to resources defined by the OS. Protection

can improve reliability by detecting latent errors at the interfaces between component subsystems. Early detection of interface errors can often prevent contamination of a healthy subsystem by another subsystem that is malfunctioning. A

protection-oriented system provides a means to distinguish between authorized and unauthorized usage. A

system can have adequate protection but still be prone to failure and allow inappropriate access. - a user whose authentication information is stolen. the data could be copied or deleted, even though file and memory protection are working. It

is the job of security to defend a system from external and internal attacks. Such

attacks spread across a huge range and include viruses and worms. Prevention

of some of these attacks is consider an OS function on some systems, while others leave the prevention of policy or additional S/W. Protection

and security require the system to be able to distinguish among all its users.

- by maintaining a list of user names and associated user identifiers (user IDs). - in windows NT-it is a security ID(SID)

When

a user logs into the system, the authentication stage determines the appropriate user ID for the user. Some

situation we distinguish among sets of users rather than individual users. - group functionality can be implemented as a system-wide list of group names and group identifiers. Sometimes

the user needs to escalate privileges to gain extra permissions for an activity. The

user may need access to a device that is restricted.

Distributed System A

distributed system is a collection of physically separate, heterogeneous computer systems that are networked to provide the users to access various resources that the system maintains. Access

to a shared resource increases computation speed, functionality, data availability and reliability. The

OS access the details of networking contained in the network interface’s device driver.

Generally,

for e.g The

systems contain a mix of the two modes. FTP and NFS.

protocols that create a distributed system can greatly affect that system’s utility and popularity. A network is a communication path between two or more systems. Distributed systems depend on networking for their functionality.

Networks

vary by the protocols used, the distances between nodes and the transport media. TCP/IP

is the most common network protocol.

OS

support of protocols varies. Most OS support TCP/IP including the windows and unix OS. To an OS, a network protocol simply needs an interface device- a network adapter for e.g. - with a device driver to manage it, as well as s/w to handle data.

Networks

are characterized based on the distances between their

nodes. Local

Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN) Bluetooth

and 802.11 devices use wireless technology to communicate over a distance of several feet, in essence creating a small-area network. The

media to carry networks include copper wires, fiber strands ,wireless transmissions between satellites, microwave dishes, and radios. A

network is created when the computing devices are connected to cellular phones. A

network operating system is an OS that provides features such as file sharing across the network and that includes a communication scheme that allows different processes on different computers to exchange messages.

Real-Time Embedded systems Embedded

systems are found everywhere from car engines and manufacturing robots to VCRs and microwave ovens.

The

systems they run on are usually primitive, and so the Os provide limited features. They

have very specific task,little or no user interface,preferring to spend their time monitoring and managing hardware devices These

systems vary depends on the system. - for computers it runs the OS unix. - h/w devices with a special purpose embedded OS providing just the functionality desired.

Embedded

systems almost always run real-time operating system.

A

real-time system is used when rigid time requirements have been placed on the operation of a processor or the flow of data. It

is used as a control device in a dedicated application.

Sensors

bring data to the computer.

The

computer must analyze the data and possibly adjust controls to modify the sensor inputs. A

real-time system has well-defined, fixed time constraints.

Processing

must be done within the defined constraints or the system will fail. A

real-time system functions correctly only if it returns the correct result within its time constraints.

Multimedia systems The

recent trend in technology is the incorporation of multimedia data in computer systems. Multimedia

data consists of audio and video files as well as conventional files.

The

multimedia data such as frames of video- must be delivered according to certain time restrictions( for e.g, 30 frames per second). Multimedia

describes a wide range of applications, - audio files such as MP3 DVD movies - video conferencing - short video clips of movie previews

Multimedia

applications may also include live webcasts.

Nowadays

they are being directed toward smaller devices including PDAs and cellular telephones.

Handheld Systems Handheld

systems include - personal digital assistants(PDAs), palm and pocket PCs and cellular telephones .These system use special-purpose embedded operating systems.

Developers

of handheld device face many challenges, due to limited

size. For e.g, - a PDA is typically about 5 inches in height and 3 inches in width and weighs less than one-half pound. Handheld

devices have a small amount of memory, slow processors and small display screens. The

amount of physical memory in a handheld depends upon the device - ranges between 512 KB and 128MB - the OS and applications must manage memory efficiently. It should return all allocated memory back to the memory manager when it is not in use. - virtual memory technique can be used.

The

second issue is the speed of the processor used in the devices.

Processors

in handheld run at a fraction of the speed of a processor

in a PC. Faster

processor require more power, which requires larger battery.

Most

handheld devices use smaller, slower processors that consume less power. In

handheld devices the OS must be designed not to tax the processor. The

last issue is I/O.

The

lack of physical space limits input methods to small keyboards, handwriting recognition. Also it limits the output options. The

tasks like reading email and browsing web pages must be condensed into smaller displays. One

approach to display the content in web pages is web clipping. - only a small subset of a web page is delivered and displayed on the handheld device.

Some

handheld devices use wireless technology, such as Bluetooth or 802.11.

Related Documents

Os Notes
May 2020 4
Os - Student Notes
November 2019 20
Os
November 2019 66
Os
November 2019 58
Os
May 2020 36
Os
November 2019 68

More Documents from ""