SlideShare a Scribd company logo
Operating System Concepts: 5
Storage and IO Virtualization
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharishi Dayanand Saraswati University Ajmer
Characteristics of Various Types of Storage
Movement between levels of storage hierarchy can
be explicit or implicit
Migration of data “A” from Disk to Register
• Multitasking environments must be careful to use most
recent value, no matter where it is stored in the storage
hierarchy
• Multiprocessor environment must provide cache coherency
in hardware such that all CPUs have the most recent value in
their cache
• Distributed environment situation even more complex
– Several copies of a datum can exist
– Various solutions covered in Chapter 19
I/O Subsystem
• One purpose of OS is to hide peculiarities
of hardware devices from the user
• I/O subsystem responsible for
– Memory management of I/O including
buffering (storing data temporarily while it is
being transferred), caching (storing parts of
data in faster storage for performance),
spooling (the overlapping of output of one job
with input of other jobs)
– General device-driver interface
– Drivers for specific hardware devices
Protection and Security
• Protection – any mechanism for controlling access of
processes or users to resources defined by the OS
• Security – defense of the system against internal and
external attacks
– Huge range, including denial-of-service, worms, viruses,
identity theft, theft of service
• Systems generally first distinguish among users, to
determine who can do what
– User identities (user IDs, security IDs) include name and
associated number, one per user
– User ID then associated with all files, processes of that user
to determine access control
– Group identifier (group ID) allows set of users to be
defined and controls managed, then also associated with
each process, file
– Privilege escalation allows user to change to effective ID
with more rights
Virtualization
• Allows operating systems to run applications within
other OSes
– Vast and growing industry
• Emulation used when source CPU type different from
target type (i.e. PowerPC to Intel x86)
– Generally slowest method
– When computer language not compiled to native code –
Interpretation
• Virtualization – OS natively compiled for CPU, running
guest OSes also natively compiled
– Consider VMware running WinXP guests, each running
applications, all on native WinXP host OS
– VMM (virtual machine Manager) provides virtualization
services
Virtualization (cont.)
• Use cases involve laptops and desktops running
multiple OSes for exploration or compatibility
– Apple laptop running Mac OS X host, Windows as a
guest
– Developing apps for multiple OSes without having
multiple systems
– QA testing applications without having multiple
systems
– Executing and managing compute environments
within data centers
• VMM can run natively, in which case they are also
the host
– There is no general purpose host then (VMware ESX
and Citrix XenServer)
Computing Environments - Virtualization
Distributed Systems
• Distributed computiing
– Collection of separate, possibly heterogeneous,
systems networked together
• Network is a communications path, TCP/IP most common
– Local Area Network (LAN)
– Wide Area Network (WAN)
– Metropolitan Area Network (MAN)
– Personal Area Network (PAN)
– Network Operating System provides features
between systems across network
• Communication scheme allows systems to exchange
messages
• Illusion of a single system

More Related Content

PDF
Operating Systems 1 (3/12) - Architectures
PDF
Operating system
PPTX
Operating system
PDF
Pt 01 introduction
PPTX
Operating System concepts
PDF
Operating Systems 1 (5/12) - Architectures (Unix)
PPT
4 operating system basics
Operating Systems 1 (3/12) - Architectures
Operating system
Operating system
Pt 01 introduction
Operating System concepts
Operating Systems 1 (5/12) - Architectures (Unix)
4 operating system basics

What's hot (18)

PPTX
Presentation on Operating System & its Components
PPT
Parallel processing extra
PPTX
Operating System - Types Of Operating System Unit-1
PPTX
Operating system
PPTX
Operating System Overview
PPTX
What is Kernel, basic idea of kernel
PPT
Kernel mode vs user mode in linux
PDF
operating system structure
PPTX
Unix Operaring System
PPTX
Operating system
PPTX
Introduction to Operating Systems
PPT
Paralle programming 2
PPTX
Chapter 1 com org (student copy)
PPTX
Presentation operating system
PPT
Operating systems
PDF
CS6401 Operating Systems
DOC
Symmetric multiprocessing and Microkernel
PPTX
Operating systems
Presentation on Operating System & its Components
Parallel processing extra
Operating System - Types Of Operating System Unit-1
Operating system
Operating System Overview
What is Kernel, basic idea of kernel
Kernel mode vs user mode in linux
operating system structure
Unix Operaring System
Operating system
Introduction to Operating Systems
Paralle programming 2
Chapter 1 com org (student copy)
Presentation operating system
Operating systems
CS6401 Operating Systems
Symmetric multiprocessing and Microkernel
Operating systems
Ad

Similar to Os concepts 5 Storage and IO Virtualization (20)

PPT
cs-intro-os.ppt
PDF
operating systems classification university
PDF
Operating System Concepts Presentation
PPTX
Week1_Introduction to_Operating System - Part 2.pptx
PPTX
Operating system v1 d1
PDF
Intro to Operating Systems - Introductory Lectures - Software Engineering
PPTX
Bsc cs 1 fit u-3 operating systems
PPTX
Bsc cs 1 fit u-3 operating systems
PPT
EMBEDDED OS
PPTX
Windows XP operating system
PPTX
Nt introduction(os)
PPTX
Mca i-fundamental of computer-u-3-functions operating systems
PPTX
Apos week 1 4
PPTX
Bca i-fundamental of computer-u-3-functions operating systems
PDF
ICT GE-309_Lecture-17-20.pdf presentation
PDF
Kernel security Concepts
PDF
Ch1 introduction
PPTX
OSModule1 important topics in detailed with examples
cs-intro-os.ppt
operating systems classification university
Operating System Concepts Presentation
Week1_Introduction to_Operating System - Part 2.pptx
Operating system v1 d1
Intro to Operating Systems - Introductory Lectures - Software Engineering
Bsc cs 1 fit u-3 operating systems
Bsc cs 1 fit u-3 operating systems
EMBEDDED OS
Windows XP operating system
Nt introduction(os)
Mca i-fundamental of computer-u-3-functions operating systems
Apos week 1 4
Bca i-fundamental of computer-u-3-functions operating systems
ICT GE-309_Lecture-17-20.pdf presentation
Kernel security Concepts
Ch1 introduction
OSModule1 important topics in detailed with examples
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des

Recently uploaded (20)

PDF
Well-logging-methods_new................
PPT
Mechanical Engineering MATERIALS Selection
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Welding lecture in detail for understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Sustainable Sites - Green Building Construction
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Digital Logic Computer Design lecture notes
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
Well-logging-methods_new................
Mechanical Engineering MATERIALS Selection
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Welding lecture in detail for understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Operating System & Kernel Study Guide-1 - converted.pdf
R24 SURVEYING LAB MANUAL for civil enggi
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Sustainable Sites - Green Building Construction
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Digital Logic Computer Design lecture notes
Model Code of Practice - Construction Work - 21102022 .pdf
UNIT 4 Total Quality Management .pptx
Construction Project Organization Group 2.pptx
bas. eng. economics group 4 presentation 1.pptx

Os concepts 5 Storage and IO Virtualization

  • 1. Operating System Concepts: 5 Storage and IO Virtualization Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharishi Dayanand Saraswati University Ajmer
  • 2. Characteristics of Various Types of Storage Movement between levels of storage hierarchy can be explicit or implicit
  • 3. Migration of data “A” from Disk to Register • Multitasking environments must be careful to use most recent value, no matter where it is stored in the storage hierarchy • Multiprocessor environment must provide cache coherency in hardware such that all CPUs have the most recent value in their cache • Distributed environment situation even more complex – Several copies of a datum can exist – Various solutions covered in Chapter 19
  • 4. I/O Subsystem • One purpose of OS is to hide peculiarities of hardware devices from the user • I/O subsystem responsible for – Memory management of I/O including buffering (storing data temporarily while it is being transferred), caching (storing parts of data in faster storage for performance), spooling (the overlapping of output of one job with input of other jobs) – General device-driver interface – Drivers for specific hardware devices
  • 5. Protection and Security • Protection – any mechanism for controlling access of processes or users to resources defined by the OS • Security – defense of the system against internal and external attacks – Huge range, including denial-of-service, worms, viruses, identity theft, theft of service • Systems generally first distinguish among users, to determine who can do what – User identities (user IDs, security IDs) include name and associated number, one per user – User ID then associated with all files, processes of that user to determine access control – Group identifier (group ID) allows set of users to be defined and controls managed, then also associated with each process, file – Privilege escalation allows user to change to effective ID with more rights
  • 6. Virtualization • Allows operating systems to run applications within other OSes – Vast and growing industry • Emulation used when source CPU type different from target type (i.e. PowerPC to Intel x86) – Generally slowest method – When computer language not compiled to native code – Interpretation • Virtualization – OS natively compiled for CPU, running guest OSes also natively compiled – Consider VMware running WinXP guests, each running applications, all on native WinXP host OS – VMM (virtual machine Manager) provides virtualization services
  • 7. Virtualization (cont.) • Use cases involve laptops and desktops running multiple OSes for exploration or compatibility – Apple laptop running Mac OS X host, Windows as a guest – Developing apps for multiple OSes without having multiple systems – QA testing applications without having multiple systems – Executing and managing compute environments within data centers • VMM can run natively, in which case they are also the host – There is no general purpose host then (VMware ESX and Citrix XenServer)
  • 8. Computing Environments - Virtualization
  • 9. Distributed Systems • Distributed computiing – Collection of separate, possibly heterogeneous, systems networked together • Network is a communications path, TCP/IP most common – Local Area Network (LAN) – Wide Area Network (WAN) – Metropolitan Area Network (MAN) – Personal Area Network (PAN) – Network Operating System provides features between systems across network • Communication scheme allows systems to exchange messages • Illusion of a single system