Professional Documents
Culture Documents
Vaishali Kamat
Vaishali Kamat
Operating System
A program that controls the execution of application programs An interface between applications and hardware The purpose of an operating system is to provide an environment in which a user can execute programs in a convenient and efficient manner.
Vaishali Kamat
Vaishali Kamat
Kernel
Portion of operating system that is in main memory Contains most frequently used functions Also called the nucleus
Vaishali Kamat
Convenience
Makes the computer more convenient to use Allows computer system resources to be used in an efficient manner Permit effective development, testing, and introduction of new system functions without interfering with service
6
Vaishali Kamat
Efficiency
Ability to evolve
Accuracy
Vaishali Kamat
Program development
Program execution Access to I/O devices Controlled access to files System access
Vaishali Kamat
Software errors
Vaishali Kamat
Accounting
Collect usage statistics Monitor performance Used to anticipate future enhancements Used for billing purposes
10
Vaishali Kamat
Services Provided by the Operating System Responsible for managing resources Functions same way as ordinary computer software
11
Vaishali Kamat
12
Vaishali Kamat
13
Vaishali Kamat
Serial Processing
No operating system Machines run from a console with display lights, toggle switches, input device, and printer Schedule time Setup included loading the compiler, source program, saving compiled program, and loading and linking
14
Vaishali Kamat
Monitors
Software that controls the sequence of events Batch jobs together Program branches back to monitor when finished
15
Vaishali Kamat
Hardware Features
Memory protection
Do not allow the memory area containing the monitor to be altered Prevents a job from monopolizing the system
Timer
16
Vaishali Kamat
Hardware Features
Privileged instructions
Certain machine level instructions can only be executed by the monitor Early computer models did not have this capability
Interrupts
17
Vaishali Kamat
Memory Protection
Certain instructions may not be executed Kernel mode Privileged instructions are executed Protected areas of memory may be accessed
18
Vaishali Kamat
Uniprogramming
19
Vaishali Kamat
Multiprogramming
When one job needs to wait for I/O, the processor can switch to the other job
20
Vaishali Kamat
Multiprogramming
21
Vaishali Kamat
Time Sharing
Using multiprogramming to handle multiple interactive jobs Processors time is shared among multiple users Multiple users simultaneously access the system through terminals
22
Vaishali Kamat
Major Achievements
Processes Memory Management Information protection and security Scheduling and resource management System structure
23
Vaishali Kamat
Processes
A program in execution An instance of a program running on a computer The entity that can be assigned to and executed on a processor A unit of activity characterized by a single sequential thread of execution, a current state, and an associated set of system resources
24
Vaishali Kamat
Process
An executable program Associated data needed by the program Execution context of the program
25
Vaishali Kamat
Memory Management
Process isolation Automatic allocation and management Support of modular programming Protection and access control Long-term storage
26
Vaishali Kamat
Virtual Memory
Allows programmers to address memory from a logical point of view No gap between the execution of successive processes while one process was written out to secondary store and the successor process was read in
27
Vaishali Kamat
28
Vaishali Kamat
Paging
Allows process to be comprised of a number of fixed-size blocks, called pages Virtual address is a page number and an offset within the page Each page may be located any where in main memory Real address or physical address in main memory
29
Vaishali Kamat
30
Vaishali Kamat
Availability
Concerned with protecting the system against interruption Assuring that users cannot read data for which access is unauthorized
Confidentiality
31
Vaishali Kamat
Data integrity
Protection of data from unauthorized modification Concerned with the proper verification of the identity of users and the validity of messages or data
Authenticity
32
Vaishali Kamat
Fairness
Differential responsiveness
Efficiency
34
Vaishali Kamat
System Structure
View the system as a series of levels Each level performs a related subset of functions Each level relies on the next lower level to perform more primitive functions This decomposes a problem into a number of more manageable subproblems
35
Vaishali Kamat
Level 1
Electronic circuits Objects are registers, memory cells, and logic gates Operations are clearing a register or reading a memory location Processors instruction set Operations such as add, subtract, load, and store
Level 2
36
Vaishali Kamat
Level 3
Level 4
37
Vaishali Kamat
Level 5
Process as a program in execution Suspend and resume processes Secondary storage devices Transfer of blocks of data Creates logical address space for processes Organizes virtual address space into blocks
38
Vaishali Kamat
Level 6
Level 7
Level 8
Communication of information and messages between processes Supports long-term storage of named files Provides access to external devices using standardized interfaces
Level 9
Level 10
39
Vaishali Kamat
Level 11
40
Vaishali Kamat
Microkernel architecture
41
Vaishali Kamat
Multithreading
Thread
42
Vaishali Kamat
There are multiple processors These processors share same main memory and I/O facilities All processors can perform the same functions
43
Vaishali Kamat
Provides the illusion of a single main memory space and single secondary memory space
44
Vaishali Kamat
Object-oriented design
Used for adding modular extensions to a small kernel Enables programmers to customize an operating system without disrupting system integrity
45
Vaishali Kamat
Windows Architecture
Modular structure for flexibility Executes on a variety of hardware platforms Supports application written for other operating system
46
Vaishali Kamat
Operating system routines can run on any available processor Different routines can execute simultaneously on different processors Multiple threads of execution within a single process may execute on different processors simultaneously Server processes may use multiple threads Share data and resources between process
47
Vaishali Kamat
UNIX
Hardware is surrounded by the operating system software Operating system is called the system kernel Comes with a number of user services and interfaces
48
Vaishali Kamat
UNIX
49
Vaishali Kamat
50
Vaishali Kamat
51
Vaishali Kamat
Process Management Memory Management System Calls User Interface command-line/GUI Buffering and spooling Interrupt Handling File Management Secondary Storage Management Scheduling Computer Security Computer Networking
52
Vaishali Kamat
Networking Concepts
Definition Parts of a Network Network Channels LANs, MANS, WANs, Backbone Networking Protocols Network Topologies Network Architectures and Network Reference Models Other Terminologies
53
Vaishali Kamat
Networking Definition
Two or more computers are connected To Communicate with each other To Share resources and files
54
Vaishali Kamat
Networking Concepts
Definition Parts of a Network Network Channels LANs, MANS, WANs, Backbone Networking Protocols Network Topologies Network Architectures and Network Reference Models Other Terminologies
55
Vaishali Kamat
Parts of a Network
Servers Host Computer Clients Channels Network Circuit Interface Devices Modems / Network Interface Cards Operating System
56
Vaishali Kamat
Networking Concepts
Definition Parts of a Network Network Channels LANs, MANS, WANs, Backbone Networking Protocols Network Topologies Network Architectures and Network Reference Models Other Terminologies
57
Vaishali Kamat
Networking Channels
Classification dimensions:
Networking Concepts
Definition Parts of a Network Network Channels LANs, MANS, WANs, Backbone Networking Protocols Network Topologies Network Architectures and Network Reference Models Other Terminologies
59
Vaishali Kamat
LANs limited geographical area MANs/WANs Larger geographical area Backbones High-bandwidthed channels connecting LANs
60
Vaishali Kamat
Networking Concepts
Definition Parts of a Network Network Channels LANs, MANS, WANs, Backbone Networking Protocols Network Topologies Network Architectures and Network Reference Models Other Terminologies
61
Vaishali Kamat
Networking Protocols
The OSI Model supports two general types of protocols. Both are common: Connection-Oriented
Sender and receiver first establish a connection, possibly negotiate on a protocol. (virtual circuit) Transmit the stream of data. Release the connection when done. E.g. Telephone connection. No advance setup is needed. Transmit the message (datagrams) when sender is ready. E.g. surface mail. 62
Vaishali Kamat
Connectionless
Steps
63
Egs Ethernet, Token-ring, Slip, PPP Every Network has one Network Layer and one Data-link Layer protocol
64
Vaishali Kamat
Networking Concepts
Definition Parts of a Network Network Channels LANs, MANS, WANs, Backbone Networking Protocols Network Topologies Network Architectures and Network Reference Models Other Terminologies
65
Vaishali Kamat
Networking Topologies
Basic geometric layout for connecting the computers to the Network channel Determines the method of channel access Topologies :
Bus Topology
Clients, servers, resources are connected directly to a single channel Bus = single channel Runs from one end of the network to the other Networks using Ethernet, use Bus Topology
67
Vaishali Kamat
Ring Topology
All computers in the LAN connected to a close loop circuit Each computer linked to the next Networks using token ring use Ring Topology
68
Vaishali Kamat
Star Topology
All clients connected individually to the server Each client uses a direct channel Was common in the Mainframe era Not commonly used in LANs Used in some WANs now
69
Vaishali Kamat
Networking Concepts
Definition Parts of a Network Network Channels LANs, MANS, WANs, Backbone Networking Protocols Network Topologies Network Architectures and Network Reference Models Other Terminologies
70
Vaishali Kamat
Architecture : It may be seen as a detailed generic blueprint with unambiguous definitions of services, interfaces, organization and defined protocols that helps in design and implementation of a set of relevant protocol stack / suite based network / internet work Reference Model : It is the same as the architecture minus the specifically defined readily usable protocols.
71
Vaishali Kamat
Presentation Layer
Session Layer Transport Layer Network Layer
Application Subsystem
Communication Subsystem
72
Vaishali Kamat
Physical Layer
Media used for device connection (copper cables, fiber optics, wireless, etc.) Supporting hardware (repeaters, hubs and network interface cards). Also includes: connector design definition of electrical signaling and encoding time or synchronization methods.
73
Vaishali Kamat
Physical Layer
The Physical Layer translates the outgoing bits received from the Data Link Layer into signals, places the signal on the media At the receiving station converts incoming signals into bits for handoff to the Data Link Layer. The Physical Layer deals only with bits on the wire and makes NO ADDRESSING DECISIONS
74
Vaishali Kamat
Data-link Layer
The Data Link Layer relies on the services of the Physical Layer. It receives and interprets the bit stream as a FRAME of data. The header includes physical or hardware (MAC) addresses of the destination and source hosts. The DLL is responsible for the error and flow control between devices. CRC (cycle redundancy check) ensures that the bits sent are the bits received.
75
Vaishali Kamat
Data-link Layer
Flow control ensures that data transmission is not performed until the receiving device is ready to receive. Ethernet and IEEEs 802.3 are examples of data link services. In Ethernet, the DLL is one layer facilitating both the hardware address, media access, payload identification. With 802.3 the DLL is divided into sub layers.
76
Vaishali Kamat
Data-link Layer
The Logical Link Control (LLC) sub layer provides protocol (payload) and control information. The Media Access Control (MAC) implements the access method and hardware address. Hardware that operates at layer 2 includes bridges and switches. These devices make decisions based on the destination hardware address contained in the frame. The NIC also provides layer 2 service at the host.
77
Vaishali Kamat
Network Layer
The Network Layer can be used to route datafrom network to network in geographically separate areas. Logical addressing is used to enable protocols operating at the Network Layer to deliver the data. When data is passed to the Network Layer it is called a packet.
78
Vaishali Kamat
Network Layer
The packet is wrapped in a header specific to the protocol (IP and IPX are examples) in use. Each protocol differentiates its address scheme.
Some protocol addresses are regulated Some schemes allow the administrator total flexibility.
Network Layer
Routers:
Devices that operate at the Network Layer. Use routing protocols to pass network connectivity information and routable protocols to pass the data.
A network wishing to communicate with another network requires a gateway device. The router serves as the gateway.
80
Vaishali Kamat
Communication System
Layers 1 through 3 make up the communication subsystem. They are implemented in hardware and supported by software. Each layer is independent.
81
Vaishali Kamat
Transportation Layer
The Transport Layer provides end to end data transport with a logical connection between the sender and the receiving hosts. It ensures data integrity through flow control and reliable data transport. Additionally the multiplexing of upper layer applications and session management provides for transparent data transfer.
82
Vaishali Kamat
Transportation Layer
Windowing or flow control is critical in the prevention of lost data. (The window is the amount of data each side is "willing" to accept.) Preventing the sending station from overflowing the receiver buffers, congestion and data loss is reduced and reliable data transport can be achieved.
83
Vaishali Kamat
Transportation Layer
84
Vaishali Kamat
Session Layer
The Session Layer sets checkpoints at specified intervals during application execution. These checkpoints break the data into grouping for error detection. In the event of a failure, both participating nodes/applications will, upon establishment of communication, use the synch points to restart and continue the application from the point of failure.
85
Vaishali Kamat
Presentation Layer
Through these translation services the Presentation Layer ensures that application data is readable between participating hosts.
86
Vaishali Kamat
Application Layer
Network applications interface to the network through the Application Layer. Support is provided for:
file transfers messaging services data access
Layer 7 protocols examples include FTP, TELNET and HTTP. Layer 7 ensures availability of the communicating entities and resources for communication.
87
Vaishali Kamat
Application Subsystem
Layers 4 thru 7 comprise the application subsystem. They are implemented in software.
88
Vaishali Kamat
Networking Concepts
Definition Parts of a Network Network Channels LANs, MANS, WANs, Backbone Networking Protocols Network Topologies Network Architectures and Network Reference Models Other Terminologies
89
Vaishali Kamat
Other Terminologies
Bridges :A network bridge connects multiple network segments. Hubs :A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. NIC : Network Interface Card. Board that provides network communication capabilities to and from a computer system. Also called an adapter.s
90
Vaishali Kamat
Other Terminologies
Switches :A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Technically, network switches operate at layer two (Data Link Layer) of the OSI model. Repeaters :Its a two-ports electronic device that just repeats what receives from one port to the other. A multiport repeater is called hub.
91
Vaishali Kamat
Other Terminologies
Gateways :In a communications network, a network node equipped for interfacing with another network that uses different protocols - translating capability. When used for network security, it is called Firewall. Routers :is an electronic device used to connect two or more computers or other electronic devices to each other, and usually to the Internet, by wire or radio signals. This allows several computers to communicate with each other and to the Internet at the same time.
92
Vaishali Kamat
Other Terminologies
Clouds :abstraction of node connectivity in the networking context Services :Functionalities provided by a layer / protocol /Entity Service Access Points: defined addresses / ports through which data / parameters are passed
93
Vaishali Kamat
Other Terminologies
Interfaces: Peer-to-Peer / Layer-to-Layer / entityto-entity Interoperability - Applies to different implementations of the same specification. Each participating device must have the identical layering for interoperability. Compatibility - applies to independent implementations of the different specifications Tunneling - tunneling protocol when one network protocol (the delivery protocol) encapsulates a different payload protocol. By using tunneling one can (for example) carry a payload over an incompatible delivery-network, or provide a secure path through an untrusted network.
94
Vaishali Kamat
Thank you !
95
Vaishali Kamat