SlideShare a Scribd company logo
Operating System Concepts: 3
I/O and Memory Basics
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharishi Dayanand Saraswati University Ajmer
I/O Structure
• After I/O starts, control returns to user program
only upon I/O completion
– Wait instruction idles the CPU until the next
interrupt
– Wait loop (contention for memory access)
– At most one I/O request is outstanding at a time, no
simultaneous I/O processing
• After I/O starts, control returns to user program
without waiting for I/O completion
– System call – request to the OS to allow user to wait
for I/O completion
– Device-status table contains entry for each I/O
device indicating its type, address, and state
– OS indexes into I/O device table to determine
device status and to modify table entry to include
interrupt
Storage Structure
• Main memory – only large storage media that the CPU can access directly
– Random access
– volatile
– random-access memory Dynamic Random-access Memory (DRAM)
• Secondary storage – extension of main memory that provides large nonvolatile
storage capacity
• Hard Disk Drives (HDD) – rigid metal or glass platters covered with magnetic
recording material
– Disk surface is logically divided into tracks, which are subdivided into sectors
– The disk controller determines the logical interaction between the device
and the computer
• Non-volatile memory (NVM) devices– faster than hard disks, nonvolatile
– Various technologies
– Becoming more popular as capacity and performance increases, price drops
Storage Hierarchy
• Storage systems organized in hierarchy
– Speed
– Cost
– Volatility
• Caching – copying information into faster
storage system; main memory can be
viewed as a cache for secondary storage
• Device Driver for each device controller to
manage I/O
– Provides uniform interface between
controller and kernel
Storage-Device Hierarchy
How a Modern Computer Works
A von Neumann architecture
Direct Memory Access Structure
• Used for high-speed I/O devices able
to transmit information at close to
memory speeds
• Device controller transfers blocks of
data from buffer storage directly to
main memory without CPU
intervention
• Only one interrupt is generated per
block, rather than the one interrupt
per byte
Computer-System Architecture
• Most systems use a single general-purpose processor
– Most systems have special-purpose processors as well
• Multiprocessors systems growing in use and
importance
– Also known as parallel systems, tightly-coupled systems
– Advantages include:
1. Increased throughput
2. Economy of scale
3. Increased reliability – graceful degradation or fault tolerance
– Two types:
1. Asymmetric Multiprocessing – each processor is assigned a specie
task.
2. Symmetric Multiprocessing – each processor performs all tasks
Symmetric Multiprocessing Architecture
A Dual-Core Design
• Multi-chip and multicore
• Systems containing all chips
– Chassis containing multiple separate systems
Non-Uniform Memory Access System
Clustered Systems
• Like multiprocessor systems, but multiple systems
working together
– Usually sharing storage via a storage-area network (SAN)
– Provides a high-availability service which survives failures
• Asymmetric clustering has one machine in hot-standby mode
• Symmetric clustering has multiple nodes running applications,
monitoring each other
– Some clusters are for high-performance computing (HPC)
• Applications must be written to use parallelization
– Some have distributed lock manager (DLM) to avoid
conflicting operations

More Related Content

PPTX
Operating system 04 storage structure and management
PPT
Opearating System
PPTX
Input/Output System (Part 2)
PPT
Ch2 OS
 
PPTX
Cpu introduction to computer
PPT
Slides of cpu
PPTX
Operating system Chapter One
Operating system 04 storage structure and management
Opearating System
Input/Output System (Part 2)
Ch2 OS
 
Cpu introduction to computer
Slides of cpu
Operating system Chapter One

What's hot (19)

PPTX
Unit 3 computer system presention
PPTX
CPU and its components
PPT
The CPU and Memory and Major Components
PPTX
Input/Output System
DOCX
Unit 1
PPTX
Ch 01 os8e
DOC
Module1
PDF
Basic CPU (Central Processing Unit)
PPTX
Embedded systems 101 final
PPT
PDF
Computer processors
PPTX
Science computer processor
PPTX
I/O Management
PPT
Three Central Processing Unit
PPTX
Parallel Processing
PPTX
CPU Arcthitecture
PPT
A451 introduction to cpu (2-12)
PPT
T03160020220124039 computeroverview 1-1
Unit 3 computer system presention
CPU and its components
The CPU and Memory and Major Components
Input/Output System
Unit 1
Ch 01 os8e
Module1
Basic CPU (Central Processing Unit)
Embedded systems 101 final
Computer processors
Science computer processor
I/O Management
Three Central Processing Unit
Parallel Processing
CPU Arcthitecture
A451 introduction to cpu (2-12)
T03160020220124039 computeroverview 1-1
Ad

Similar to Os concepts 3 I/O and storage Basics (20)

PDF
Ch1 introduction
PDF
PB1MAT_TIF17 - Pertemuan 1-2ghfctrerdxt.pdf
PPT
chapter1.ppt
PPT
OS Functions and Services
PPTX
Computer system architecture
PPTX
Operating system introduction and introduction
PPT
cs-intro-os.ppt
PPT
Module 1 Introduction.ppt
PPTX
CSE3120- Module1 part 1 v1.pptx
PDF
Introduction to Operating Systems.pdf
PPT
In out system
PDF
Ch12 io systems
PDF
Operating systems-chapter-1 silberschatz
PPTX
Operating system (BCS303) MODULE 1 NOTES
PPT
Os concepts
PPT
Computer Architecture & Organization.ppt
PPT
02-archsupport.ppt Architecture Support for OPS
PPTX
2--Computer-System-Organization-13022025-114937am.pptx
Ch1 introduction
PB1MAT_TIF17 - Pertemuan 1-2ghfctrerdxt.pdf
chapter1.ppt
OS Functions and Services
Computer system architecture
Operating system introduction and introduction
cs-intro-os.ppt
Module 1 Introduction.ppt
CSE3120- Module1 part 1 v1.pptx
Introduction to Operating Systems.pdf
In out system
Ch12 io systems
Operating systems-chapter-1 silberschatz
Operating system (BCS303) MODULE 1 NOTES
Os concepts
Computer Architecture & Organization.ppt
02-archsupport.ppt Architecture Support for OPS
2--Computer-System-Organization-13022025-114937am.pptx
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des

Recently uploaded (20)

PDF
PPT on Performance Review to get promotions
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Well-logging-methods_new................
PPTX
Geodesy 1.pptx...............................................
PDF
composite construction of structures.pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
UNIT 4 Total Quality Management .pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPT on Performance Review to get promotions
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Well-logging-methods_new................
Geodesy 1.pptx...............................................
composite construction of structures.pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
UNIT 4 Total Quality Management .pptx
R24 SURVEYING LAB MANUAL for civil enggi
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CH1 Production IntroductoryConcepts.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
additive manufacturing of ss316l using mig welding

Os concepts 3 I/O and storage Basics

  • 1. Operating System Concepts: 3 I/O and Memory Basics Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharishi Dayanand Saraswati University Ajmer
  • 2. I/O Structure • After I/O starts, control returns to user program only upon I/O completion – Wait instruction idles the CPU until the next interrupt – Wait loop (contention for memory access) – At most one I/O request is outstanding at a time, no simultaneous I/O processing • After I/O starts, control returns to user program without waiting for I/O completion – System call – request to the OS to allow user to wait for I/O completion – Device-status table contains entry for each I/O device indicating its type, address, and state – OS indexes into I/O device table to determine device status and to modify table entry to include interrupt
  • 3. Storage Structure • Main memory – only large storage media that the CPU can access directly – Random access – volatile – random-access memory Dynamic Random-access Memory (DRAM) • Secondary storage – extension of main memory that provides large nonvolatile storage capacity • Hard Disk Drives (HDD) – rigid metal or glass platters covered with magnetic recording material – Disk surface is logically divided into tracks, which are subdivided into sectors – The disk controller determines the logical interaction between the device and the computer • Non-volatile memory (NVM) devices– faster than hard disks, nonvolatile – Various technologies – Becoming more popular as capacity and performance increases, price drops
  • 4. Storage Hierarchy • Storage systems organized in hierarchy – Speed – Cost – Volatility • Caching – copying information into faster storage system; main memory can be viewed as a cache for secondary storage • Device Driver for each device controller to manage I/O – Provides uniform interface between controller and kernel
  • 6. How a Modern Computer Works A von Neumann architecture
  • 7. Direct Memory Access Structure • Used for high-speed I/O devices able to transmit information at close to memory speeds • Device controller transfers blocks of data from buffer storage directly to main memory without CPU intervention • Only one interrupt is generated per block, rather than the one interrupt per byte
  • 8. Computer-System Architecture • Most systems use a single general-purpose processor – Most systems have special-purpose processors as well • Multiprocessors systems growing in use and importance – Also known as parallel systems, tightly-coupled systems – Advantages include: 1. Increased throughput 2. Economy of scale 3. Increased reliability – graceful degradation or fault tolerance – Two types: 1. Asymmetric Multiprocessing – each processor is assigned a specie task. 2. Symmetric Multiprocessing – each processor performs all tasks
  • 10. A Dual-Core Design • Multi-chip and multicore • Systems containing all chips – Chassis containing multiple separate systems
  • 12. Clustered Systems • Like multiprocessor systems, but multiple systems working together – Usually sharing storage via a storage-area network (SAN) – Provides a high-availability service which survives failures • Asymmetric clustering has one machine in hot-standby mode • Symmetric clustering has multiple nodes running applications, monitoring each other – Some clusters are for high-performance computing (HPC) • Applications must be written to use parallelization – Some have distributed lock manager (DLM) to avoid conflicting operations