SlideShare a Scribd company logo
K.KAVIYA(14BIT008)
SUBMITTED TO:
Ms.R.MADHUBALA, MCA.,
This file system can be viewed logically
consist of following parts:
 Disk structure
 Disk scheduling
 Disk Management
 Swap-space Management
 Disk provide the bulk of secondary storage
 Magnetic tape was used an early secondary storage
medium
 Modern disk drives are addressed as large one-
dimensional arrays of logical blocks
 The logical blocks is the smallest unit of tranfer.
 The one-dimensional array of logical blocks is
mapped onto the sectors of the disk sequentially.
 It is difficult to perform two reasons
 Most disks have some defective sectors.
 The number of sectors per track is not a
constant on some drives.
 The disk drives has fast access time and disk bandwidth
 The access time has two major components.
 Seek time
 Rotational latency
 The disk bandwidth is the total number of byes
transferred, divided by the total time between the
first request for service and the completion of the last
transfer.
 The request specifies several pieces of information
I. Whether this operation is input or output
II. What the disk address for the transfer is
III. What the memory address for the transfer is
IV. What the number of bytes to the transferred is
The simplest form of disk scheduling is the first
come, first-served(FCFS) algorithm.
The algorithm does not provide the fastest
services.
SSTF Scheduling
 It seems reasonable to service all the requests
close to the current head position, before
moving the head far away to service.
 The assumption is the basis for the shortest-
seek-time-first algorithm
 The SSTF algorithm selects the request with
the minimum seek time from the current head
position
 In the scan algorithm the disk arm starts at one
end of the disk, and moves toward the other end.
 The direction of head movement is reversed, and
servicing continues.
 The scan algorithm is sometimes called the
elevator algorithm
C- SCAN scheduling
 Circular scan scheduling is a variant of SCAN designed
to provide a more wait time
 The C-SCAN scheduling algorithm treats the cylinders
as a circular list that wraps around from the final cylinder
to the first one.
• The scheduling algorithms described the seek
distances for modern disks, the rotational latency
Can be nearly as large as the average seek time.
• But it is difficult for the operating system to
scheduled for improved rotational latency because
modern disks do not disclose the physical location of
logical blocks.
Disk Formatting
• A new magnetic disk is a blank slate.
• It must be divided into sectors that the disk controller
can read and write. This process is called Low level
formatting
• A sector number and an error-correcting code.
• The operating system still needs to record its own data
structures.
• In two steps
• The first step is two partition the disk into one or more
groups of cylinders
• The second step is logical formatting.
• In this step the operating system stores the initial file
system data structures into the disk
 The bootstrap is stored in read only memory
 The full bootstrap program is stored in a partition
called the boot blocks, at a fixed location on the
disk.
 A disk that has a boot partition is called a boot
disk or system disk.
Bad blocks
 Most frequently, one or more sectors become defective.
 Most disks even come form the factory with bad blocks
 This scheme is known as sector sparing or forwarding
Swap-space management is another low-level task of the
operating system
The main goal for the design and implementation of swap
space is to provide the best throughput for the
Virtual memory system
Swap-space use
Swap space is used in various ways by different operating systems,
depending on the implemented memory-management
Algorithms.
Swap-space Location
 A swap space can reside in two places.
 Swap space can be carved out of the normal file system or it can be
in a seperated disk partition.
Operating system ppt
 Windows 2000 Operating system is a 32-bit
preemptive multitasking operating system for Intel
pentium and later microprocessor.
 In 1980 Microsoft and IBM cooperated to develop
the OS/2 operating system in single processor Intel
80286
 Microsoft developed a portable operating system
that supported both the application system.
 There are four versions of windows 2000
 The professional version intended for desktop use.
 The other three are server version datacenter
version.
 The design goals that Micros0ft has stated for
windows 2000 include Extensibility, portability,
compatibility, performance.
 Extensibility refers to the capacity of the operating
system to keep up advances in computing technology
 Windows 2000 uses a client-server model.
 Mach operating system and supports multiple
processing by remoter procedure call(RPC).
 An operating system is portable and it can be
moved from one hardware architecture to another.
 The architecture of windows 2000 is a layered
system of modules.
 The user-mode subsystems are in two categories
environment subsystems emulate different operating
systems;the subsystems provide security functions.
 One of the chief advantages of the architecture is
the intreactions between modules can be kept simple
remainder of this section describes these layers and
subsytems.
 HAL is the layer of software that hides hardware
differences from the operating system,virtual-machine
interface that is used by the kernel,the exculive and
device drivers.
 One advantage of this approach is that only a single
of each device driver is needed-it can run on all
hardware flatform will porting the driver code.
 The kernal of windows 2000 provides the fundation
for the executive and subsystems.
 kernal uses to sets of objects. The first set
comparises the dispatcher.
 Dispatcher objects control dispatching and
synchoronous the event object is used to record an
event occurances.
 Synchronize the later with some action A semaphore
objects acts as a counter or gate to control the number
that access some resource.
 The thread object is the entity that is run kernal and
is associated with a process object.
 Timer objects are used to keep track of the time
and
and to signal time outs when operations and need to
be interrupted
 The second set of kernal objects comparises the
control objects.
 The power states object to check whether the
power
a process object represents the virtual address
space and control.
 The system uses the profile object to measure the
amount of time used by a amount of code
 Windows 2000 uses the process and threads for
executable code .
 Each process has one or more threads. Each thread
has its own state.
 It includes a priority, processor, affinity, and
accounting information.
 The six possible thread states or ready, stand by ,
running, waiting, and terminated.
 Ready means waiting to run.
 The highest priority thread is moved to the standby
state.
 A thread is running when it is executing on a
processor
 A thread is in the waiting state when it is waiting for
a signal
 A new thread is in the transition state while it is
waiting resourcs necessary for execlution
 A thread enters the terminated state finishes
execution
 Kernal also provides trap handling for exceptions
and interrupts that are used by hardware or software
 windows 2000 defines several architecture
exceptions including memory-access violation integer
overflow or underflow, integer divide by zero, floating-
point by zero , illegal instruction , data misalignment,
privileged instruction, read error , guard-page,
violation, paging files, quote exceeded, debugger, point
and debugger, single step.
 The exeption dispatcher creates and exception that
contains the reason for the exception and finds an
exception handler deal with it.
 The kernal uses an interrupted dispatch table to
bind each interrupt that a service routine
 Windows 2000 takes advantage of this property to
software interrupts to perform system functions
 kernal uses the dispatch interrupt to control thread
context switching to the kernal is running.
 It queues a deferred procedure call(DPC) that
contains the address of the function to be executed
and generates interrupt.
 They cannot modify its memory: create, acquire, or
wait on objects, call system services or page faults.
 Third reponsibility of the kernal is to provide low-
level processor synchronization.
 The APC mechanism is similar to the DPC algorithm
but was most use.
 The APC mechanism enables threads to set up a
procedure call that happen out of the blue at some
future time.
 windows 2000 can run on symmetric multiprocessor
machines, so the kernal must prevent two of its
threads from modifying a shared data structure in
same time.
 The fourth and final responsibility of the kernal is
to provide recovery after a failure
 A power fail interrupt which has the second-highest
priority notifies the operating system whenever a
power loss is detected.
 The power notify object provides a way for a device
driver to register a routine that is call on power
restoration and ensures that devices get set to the
proper and recovery
 Object manager
 Virtual- Memory Manager
 process manager
 Local-procedure-call facility
 I/O manager
 Security reference monitor
 Plug-and-play manager
MS-DOS subsystem
16-bit Windows Environment
 Win32 Environment
 POSIX subsystem
 OS/2 subsystem
 Logon and security subsystem
• Internal layout
• Recovery
• Security
• Volume Management andFault Tolerance
• Compression
• Reparse Points
 Windows 2000 supports both peer-to-peer and
client server networking.
The networking components provide data transport,
interprocess communication file sharing across a network,
and the ability to send print jobs to remote printers.
 Protocols
 Distributed processing Mechanisms

More Related Content

PPT
Windows Kernel-
PPT
Chapter 22 - Windows XP
PPT
PPT
Windows kernel
PDF
Cs8493 unit 5
PDF
Cs8493 unit 4
PPT
Device Drivers
PPTX
Windows XP operating system
Windows Kernel-
Chapter 22 - Windows XP
Windows kernel
Cs8493 unit 5
Cs8493 unit 4
Device Drivers
Windows XP operating system

What's hot (17)

PPTX
Io sy.stemppt
PPT
Device Driver in WinCE 6.0 R2
PDF
Cs8493 unit 2
PPT
PDF
Cs8493 unit 3
PDF
Process management
PPT
Chapter 9 OS
 
PPTX
Understanding Modern Device Drivers
PPT
Driver development – memory management
PDF
Kernel
PPT
LINUX Device Drivers
DOCX
UNIT II-Programming in Linux
PDF
Cs8493 unit 1
PPT
PPTX
System components of windows xp
PPTX
Windows Architecture Explained by Stacksol
Io sy.stemppt
Device Driver in WinCE 6.0 R2
Cs8493 unit 2
Cs8493 unit 3
Process management
Chapter 9 OS
 
Understanding Modern Device Drivers
Driver development – memory management
Kernel
LINUX Device Drivers
UNIT II-Programming in Linux
Cs8493 unit 1
System components of windows xp
Windows Architecture Explained by Stacksol
Ad

Viewers also liked (11)

PPT
Untitled
PPTX
La mujer
PPT
слайд бристоль
PDF
2721 engineering to consulting booz allen hamilton
DOCX
La energia renovable
PDF
A escolarização da literatura infantil e juvenil completo
PPTX
คำสั่งควบคุมของโปรแกรม
DOC
ASSESSMENT AND EVALUATION TEST ENGLISH 7
DOCX
konsep dasar kewirausahaan _2017
PPT
Kiri ch ko (3)
Untitled
La mujer
слайд бристоль
2721 engineering to consulting booz allen hamilton
La energia renovable
A escolarização da literatura infantil e juvenil completo
คำสั่งควบคุมของโปรแกรม
ASSESSMENT AND EVALUATION TEST ENGLISH 7
konsep dasar kewirausahaan _2017
Kiri ch ko (3)
Ad

Similar to Operating system ppt (20)

PPTX
Operation System
PPTX
PPTX
Operation System
PPTX
I/O structure slide by Rajalakshmi SKC
PPTX
I/O System and Case study
PPTX
I/O System and Case Study
PPTX
Window architecture
PPT
OSLec1&2.ppt
PDF
Os file
PPT
operating system over view.ppt operating sysyems
PPTX
Operating Systems: Revision
PPTX
File system and Deadlocks
PPTX
PPTX
Mass storage structure
PPT
Introduction To operating System:
PPTX
CSE3120- Module1 part 1 v1.pptx
PPTX
Unit 1-Operating Systems Overview .pptx
Operation System
Operation System
I/O structure slide by Rajalakshmi SKC
I/O System and Case study
I/O System and Case Study
Window architecture
OSLec1&2.ppt
Os file
operating system over view.ppt operating sysyems
Operating Systems: Revision
File system and Deadlocks
Mass storage structure
Introduction To operating System:
CSE3120- Module1 part 1 v1.pptx
Unit 1-Operating Systems Overview .pptx

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Mushroom cultivation and it's methods.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Programs and apps: productivity, graphics, security and other tools
A comparative analysis of optical character recognition models for extracting...
MIND Revenue Release Quarter 2 2025 Press Release
A comparative study of natural language inference in Swahili using monolingua...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25-Week II
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
SOPHOS-XG Firewall Administrator PPT.pptx
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Mushroom cultivation and it's methods.pdf

Operating system ppt

  • 2. This file system can be viewed logically consist of following parts:  Disk structure  Disk scheduling  Disk Management  Swap-space Management
  • 3.  Disk provide the bulk of secondary storage  Magnetic tape was used an early secondary storage medium  Modern disk drives are addressed as large one- dimensional arrays of logical blocks  The logical blocks is the smallest unit of tranfer.  The one-dimensional array of logical blocks is mapped onto the sectors of the disk sequentially.  It is difficult to perform two reasons  Most disks have some defective sectors.  The number of sectors per track is not a constant on some drives.
  • 4.  The disk drives has fast access time and disk bandwidth  The access time has two major components.  Seek time  Rotational latency  The disk bandwidth is the total number of byes transferred, divided by the total time between the first request for service and the completion of the last transfer.  The request specifies several pieces of information I. Whether this operation is input or output II. What the disk address for the transfer is III. What the memory address for the transfer is IV. What the number of bytes to the transferred is
  • 5. The simplest form of disk scheduling is the first come, first-served(FCFS) algorithm. The algorithm does not provide the fastest services. SSTF Scheduling  It seems reasonable to service all the requests close to the current head position, before moving the head far away to service.  The assumption is the basis for the shortest- seek-time-first algorithm  The SSTF algorithm selects the request with the minimum seek time from the current head position
  • 6.  In the scan algorithm the disk arm starts at one end of the disk, and moves toward the other end.  The direction of head movement is reversed, and servicing continues.  The scan algorithm is sometimes called the elevator algorithm C- SCAN scheduling  Circular scan scheduling is a variant of SCAN designed to provide a more wait time  The C-SCAN scheduling algorithm treats the cylinders as a circular list that wraps around from the final cylinder to the first one.
  • 7. • The scheduling algorithms described the seek distances for modern disks, the rotational latency Can be nearly as large as the average seek time. • But it is difficult for the operating system to scheduled for improved rotational latency because modern disks do not disclose the physical location of logical blocks.
  • 8. Disk Formatting • A new magnetic disk is a blank slate. • It must be divided into sectors that the disk controller can read and write. This process is called Low level formatting • A sector number and an error-correcting code. • The operating system still needs to record its own data structures. • In two steps • The first step is two partition the disk into one or more groups of cylinders • The second step is logical formatting. • In this step the operating system stores the initial file system data structures into the disk
  • 9.  The bootstrap is stored in read only memory  The full bootstrap program is stored in a partition called the boot blocks, at a fixed location on the disk.  A disk that has a boot partition is called a boot disk or system disk. Bad blocks  Most frequently, one or more sectors become defective.  Most disks even come form the factory with bad blocks  This scheme is known as sector sparing or forwarding
  • 10. Swap-space management is another low-level task of the operating system The main goal for the design and implementation of swap space is to provide the best throughput for the Virtual memory system Swap-space use Swap space is used in various ways by different operating systems, depending on the implemented memory-management Algorithms. Swap-space Location  A swap space can reside in two places.  Swap space can be carved out of the normal file system or it can be in a seperated disk partition.
  • 12.  Windows 2000 Operating system is a 32-bit preemptive multitasking operating system for Intel pentium and later microprocessor.  In 1980 Microsoft and IBM cooperated to develop the OS/2 operating system in single processor Intel 80286  Microsoft developed a portable operating system that supported both the application system.  There are four versions of windows 2000  The professional version intended for desktop use.  The other three are server version datacenter version.
  • 13.  The design goals that Micros0ft has stated for windows 2000 include Extensibility, portability, compatibility, performance.  Extensibility refers to the capacity of the operating system to keep up advances in computing technology  Windows 2000 uses a client-server model.  Mach operating system and supports multiple processing by remoter procedure call(RPC).  An operating system is portable and it can be moved from one hardware architecture to another.
  • 14.  The architecture of windows 2000 is a layered system of modules.  The user-mode subsystems are in two categories environment subsystems emulate different operating systems;the subsystems provide security functions.  One of the chief advantages of the architecture is the intreactions between modules can be kept simple remainder of this section describes these layers and subsytems.
  • 15.  HAL is the layer of software that hides hardware differences from the operating system,virtual-machine interface that is used by the kernel,the exculive and device drivers.  One advantage of this approach is that only a single of each device driver is needed-it can run on all hardware flatform will porting the driver code.
  • 16.  The kernal of windows 2000 provides the fundation for the executive and subsystems.  kernal uses to sets of objects. The first set comparises the dispatcher.  Dispatcher objects control dispatching and synchoronous the event object is used to record an event occurances.  Synchronize the later with some action A semaphore objects acts as a counter or gate to control the number that access some resource.  The thread object is the entity that is run kernal and is associated with a process object.
  • 17.  Timer objects are used to keep track of the time and and to signal time outs when operations and need to be interrupted  The second set of kernal objects comparises the control objects.  The power states object to check whether the power a process object represents the virtual address space and control.  The system uses the profile object to measure the amount of time used by a amount of code
  • 18.  Windows 2000 uses the process and threads for executable code .  Each process has one or more threads. Each thread has its own state.  It includes a priority, processor, affinity, and accounting information.  The six possible thread states or ready, stand by , running, waiting, and terminated.
  • 19.  Ready means waiting to run.  The highest priority thread is moved to the standby state.  A thread is running when it is executing on a processor  A thread is in the waiting state when it is waiting for a signal  A new thread is in the transition state while it is waiting resourcs necessary for execlution  A thread enters the terminated state finishes execution
  • 20.  Kernal also provides trap handling for exceptions and interrupts that are used by hardware or software  windows 2000 defines several architecture exceptions including memory-access violation integer overflow or underflow, integer divide by zero, floating- point by zero , illegal instruction , data misalignment, privileged instruction, read error , guard-page, violation, paging files, quote exceeded, debugger, point and debugger, single step.  The exeption dispatcher creates and exception that contains the reason for the exception and finds an exception handler deal with it.
  • 21.  The kernal uses an interrupted dispatch table to bind each interrupt that a service routine  Windows 2000 takes advantage of this property to software interrupts to perform system functions  kernal uses the dispatch interrupt to control thread context switching to the kernal is running.  It queues a deferred procedure call(DPC) that contains the address of the function to be executed and generates interrupt.  They cannot modify its memory: create, acquire, or wait on objects, call system services or page faults.
  • 22.  Third reponsibility of the kernal is to provide low- level processor synchronization.  The APC mechanism is similar to the DPC algorithm but was most use.  The APC mechanism enables threads to set up a procedure call that happen out of the blue at some future time.  windows 2000 can run on symmetric multiprocessor machines, so the kernal must prevent two of its threads from modifying a shared data structure in same time.
  • 23.  The fourth and final responsibility of the kernal is to provide recovery after a failure  A power fail interrupt which has the second-highest priority notifies the operating system whenever a power loss is detected.  The power notify object provides a way for a device driver to register a routine that is call on power restoration and ensures that devices get set to the proper and recovery
  • 24.  Object manager  Virtual- Memory Manager  process manager  Local-procedure-call facility  I/O manager  Security reference monitor  Plug-and-play manager
  • 25. MS-DOS subsystem 16-bit Windows Environment  Win32 Environment  POSIX subsystem  OS/2 subsystem  Logon and security subsystem
  • 26. • Internal layout • Recovery • Security • Volume Management andFault Tolerance • Compression • Reparse Points
  • 27.  Windows 2000 supports both peer-to-peer and client server networking. The networking components provide data transport, interprocess communication file sharing across a network, and the ability to send print jobs to remote printers.  Protocols  Distributed processing Mechanisms