Understanding Operating System: Yasir Hussain
Understanding Operating System: Yasir Hussain
Yasir Hussain
Yasir Hussain
BCA , MCA/ NIT SRINAGAR (Gold Medalist)
Operating System
• An operating system (OS) is system software that manages computer hardware, software
resources, and provides common services for computer programs. ... Other specialized
classes of operating systems, such as embedded and real-time systems, exist for many
applications.
• An operating system (OS) is the program that, after being initially loaded into the computer
by a boot program, manages all of the other application programs in a computer. The
application programs make use of the operating system by making requests for services
through a defined application program interface (API). In addition, users can interact directly
with the operating system through a user interface such as a command line or a graphical
user interface (GUI).
Computer system can be divided into four components
• When you push the power button, power is sent to a small bootloader program, which
loads the computer's operating system. The bootloader is located in the cache memory.
The cache memory is a portion of your RAM that is directly attached to the central
processing unit (CPU).
• Once the bootloader program gets power, it starts the process of activating the
operating system. If you were to see this happening, it would show a black screen with
the text of the boot up processes.
How operating system Load
• Bootstrapping is the process of loading a set of instructions when a computer is first turned on or
booted. During the startup process, diagnostic tests are performed, such as the power-on self-
test (POST), that set or check configurations for devices and implement routine testing for the
connection of peripherals, hardware and external memory devices. The bootloader or bootstrap
program is then loaded to initialize the OS.
• When the computer is turned on or restarted, the bootstrap loader first performs the power-on
self-test, also known as POST. If the POST is successful and no issues are found, the bootstrap
loader will load the operating system for the computer into memory. The computer will then
be able to quickly access, load, and run the operating system.
History Of OS
•Operating systems were first developed in the late 1950s to manage tape storage
•The General Motors Research Lab implemented the first OS in the early 1950s for their IBM 701
•In the mid-1960s, operating systems started to use disks
•In the late 1960s, the first version of the Unix OS was developed
•The first OS built by Microsoft was DOS. It was built in 1981 by purchasing the 86-DOS software
from a Seattle company
•The present-day popular OS Windows first came to existence in 1985 when a GUI was created and
paired with MS-DOS.
What is a Kernel?
The kernel is the central component of a computer operating systems. The only job
is to the manage the communication between the software and the hardware. A Kernel is at
computer. It makes the communication between the hardware and software possible. While
innermost part of an operating system, a shell is the outermost one.
Types of Operating System
•A Mobile / computer Operating System
•An Embedded operating system
•A Network operating system (NOS)
•A Real-time operating system (RTOS)
A Mobile / computer Operating System
• A mobile OS allows smartphones, tablet PCs and other mobile devices to run applications
and programs. Mobile operating systems include Apple iOS, Google Android, BlackBerry
OS and Windows 10 Mobile.
An Embedded operating system
• An embedded operating system is specialized for use in the computers built into
larger systems, such as cars, traffic lights, digital televisions, ATMs, airplane
controls, point of sale (POS) terminals, digital cameras, GPS navigation systems,
elevators, digital media receivers and smart meters.
A Network operating system (NOS)
Virtual Memory:
This is a technique used by the operating systems which allow the user can load the programs which are larger than the
main memory of the computer. In this technique the program is executed even if the complete program can not be
loaded inside the main memory leading to efficient memory utilization.
Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of
main memory.
Swapping
Swapping is a mechanism in which a process can be swapped temporarily out of main memory (or
move) to secondary storage (disk) and make that memory available to other processes. At some
later time, the system swaps back the process from the secondary storage to main memory.
Though performance is usually affected by swapping process but it helps in running multiple and big
processes in parallel and that's the reason Swapping is also known as a technique for memory
compaction.
Paging is a method of writing data to, and reading it from, secondary storage for use in
primary storage, also known as main memory. ... In a memory management system that takes
advantage of paging, the OS reads data from secondary storage in blocks called pages, all of
which have identical size.
In a memory management system that takes advantage of paging, the OS reads data from
secondary storage in blocks called pages, all of which have identical size. The physical region of
memory containing a single page is called a frame.
Processor Management
In a multi programming environment, the OS decides the order in which processes have access to the
processor,
•and how much processing time each process has. This function of OS is called process scheduling. An
Operating
•System performs the following activities for processor management.
Keeps tracks of the status of processes. The program which perform this task is known as traffic
controller.
Allocates the CPU that is processor to a process. De-allocates processor when a process is no more
required.
this deals with management of the Central Processing Unit (CPU). The operating system takes care of the
allotment of CPU time to different processes. When a process finishes its CPU processing after executing
for the allotted time period, this is called scheduling. There are various type of scheduling techniques that
are used by the operating systems:
1.Shortest Job First(SJF): Process which need the shortest CPU time are
scheduled first.
2.Round Robin Scheduling: Each process is assigned a fixed CPU
execution time in cyclic way.
3.Priority Based scheduling (Non Preemptive): In this scheduling,
processes are scheduled according to their priorities, i.e., highest priority
process is schedule first. If priorities of two processes match, then schedule
according to arrival time
• Multitasking: Operating System manages memory and allow multiple programs to run in
their own space and even communicate with each other through shared memory.
Multitasking gives users a good experience as they can perform several tasks on a
computer at a time
Device Management
An OS manages device communication via their respective drivers. It performs the following
activities for device management. Keeps tracks of all devices connected to system. designates a
program responsible for every device known as the Input/output controller. Decides which
process gets access to a certain device and for how long. Allocates devices in an effective and
efficient way. Deallocates devices when they are no longer required.
Buffering:
In this technique, input and output data is temporarily stored in Input Buffer and Output Buffer. Once the
signal for input or output is sent to or from the CPU respectively, the operating system through the device
controller moves the data from the input device to the input buffer and for the output device to the output
buffer. In case of input, if the buffer is full, the operating system sends a signal to the program which
processes the data stored in the buffer. When the buffer becomes empty, the program informs the operating
system which reloads the buffer and the input operation continues.
• File Management
A file system is organized into directories for efficient or easy navigation and usage. These directories
may contain other directories and other files. An Operating System carries out the following file
management activities. It keeps track of where information is stored, user access settings and status
of every file and more… These facilities are collectively known as the file system.
File management is one of the basic and important features of operating system. Operating
system is used to manage files of computer system. All the files with different extensions are
managed by operating system.
The following are some of the tasks performed by file management of operating
system of any computer system:
1.It helps to create new files in computer system and placing them at the specific
locations.
2.It helps in easily and quickly locating these files in computer system.
3.It makes the process of sharing of the files among different users very easy and user
friendly.
4.It helps to stores the files in separate folders known as directories. These directories
help users to search file quickly or to manage the files according to their types or uses.
5.It helps the user to modify the data of files or to modify the name of the file in the
directories.
System Security Plan
A system security plan is a formal plan that defines the plan of action to secure a
computer or information system.
It provides a systematic approach and techniques for protecting a computer from
being used by unauthorized users, guards against worms and viruses as well as any
other incident/event/process that can jeopardize the underlying system’s security.
• OS security refers to specified steps or measures used to protect the OS from threats, viruses,
worms, malware or remote hacker intrusions. OS security encompasses all preventive-control
techniques, which safeguard any computer assets capable of being stolen, edited or deleted if
OS security is compromised.
OS security encompasses many different techniques and methods which ensure safety from
threats and attacks. OS security allows different applications and programs to perform
required tasks and stop unauthorized interference.
2 Use of service packs – Keep up-to-date and install the latest versions. It’s
that simple. No one thing ensures protection, especially from zero-day attacks, but
this is an easy rule to follow.
3 Patches and patch management – Planning, testing, implementing and auditing patch management
software should be part of a regular security regimen. Make sure the OS is patched regularly, as well as
the individual programs on the client's computer.
4. Group policies – Define what groups can or can’t access and maintain these rules. Sometimes,
it’s simply user error that leads to a successful cyber attack. Establish or update user policies and
ensure all users are aware and comply with these procedures. For example, everyone should
be implementing strong passwords, securing their credentials and changing them regularly.
5. Security templates – Groups of policies that can be loaded in one procedure; they are commonly used
in corporate environments.