SlideShare a Scribd company logo
Chapter 3:  Operating-System Structures System Components Operating System Services System Calls System Programs System Structure  Virtual Machines System Design and Implementation System Generation
Common System Components Process Management  Main Memory Management File Management I/O System Management Secondary Management Networking Protection System Command-Interpreter System
Process Management A  process  is a program in execution.  A process needs certain resources, including CPU time, memory, files, and I/O devices, to accomplish its task. The operating system is responsible for the following activities in connection with process management. Process creation and deletion. process suspension and resumption. Provision of mechanisms for: process synchronization process communication
Main-Memory Management Memory is a large array of words or bytes, each with its own address.  It is a repository of quickly accessible data shared by the CPU and I/O devices. Main memory is a volatile storage device.  It loses its contents in the case of system failure. The operating system is responsible for the following activities in connections with memory management: Keep track of which parts of memory are currently being used and by whom. Decide which processes to load when memory space becomes available. Allocate and deallocate memory space as needed.
File Management A file is a collection of related information defined by its creator.  Commonly, files represent programs (both source and object forms) and data. The operating system is responsible for the following activities in connections with file management: File creation and deletion. Directory creation and deletion. Support of primitives for manipulating files and directories. Mapping files onto secondary storage. File backup on stable (nonvolatile) storage media.
I/O System Management The I/O system consists of: A buffer-caching system  A general device-driver interface Drivers for specific hardware devices
Secondary-Storage Management Since main memory ( primary storage ) is volatile and too small to accommodate all data and programs permanently, the computer system must provide  secondary storage  to back up main memory. Most modern computer systems use disks as the principle on-line storage medium, for both programs and data. The operating system is responsible for the following activities in connection with disk management:  Free space management Storage allocation Disk scheduling
Networking (Distributed Systems) A  distributed  system is a collection processors that do not share memory or a clock.  Each processor has its own local memory. The processors in the system are connected through a communication network. Communication takes place using a  protocol. A distributed system provides user access to various system resources. Access to a shared resource allows: Computation speed-up  Increased data availability Enhanced reliability
Protection System Protection  refers to a mechanism for controlling access by programs, processes, or users to both system and user resources. The protection mechanism must:  distinguish between authorized and unauthorized usage. specify the controls to be imposed. provide a means of enforcement.
Command-Interpreter System Many commands are given to the operating system by control statements which deal with: process creation and management I/O handling secondary-storage management main-memory management file-system access  protection  networking
Command-Interpreter System (Cont.) The program that reads and interprets control statements is called variously: command-line interpreter shell (in UNIX)   Its function is to get and execute the next command statement.
Operating System Services Program execution – system capability to load a program into memory and to run it. I/O operations –  since user programs cannot execute I/O operations directly, the operating system must provide some means to perform I/O. File-system manipulation – program capability to read, write, create, and delete files. Communications – exchange of information between processes executing either on the same computer or on different systems tied together by a network.  Implemented via  shared memory  or  message passing . Error detection – ensure correct computing by detecting errors in the CPU and memory hardware, in I/O devices, or in user programs.
Additional Operating System Functions Additional functions exist not for helping the user, but rather for ensuring efficient system operations. Resource allocation – allocating resources to multiple users or multiple jobs running at the same time. Accounting – keep track of and record which users use how much and what kinds of computer resources for account billing or for accumulating usage statistics. Protection – ensuring that all access to system resources is controlled.
System Calls System calls provide the interface between a running program and the operating system. Generally available as assembly-language instructions. Languages defined to replace assembly language for systems programming allow system calls to be made directly (e.g., C, C++) Three general methods are used to pass parameters between a running program and the operating system. Pass parameters in  registers . Store the parameters in a table in memory, and the table address is passed as a parameter in a register. Push  (store) the parameters onto the  stack  by the program, and  pop  off the stack by operating system.
Passing of Parameters As A Table
Types of System Calls Process control File management Device management Information maintenance Communications
MS-DOS Execution At System Start-up Running a Program
UNIX Running Multiple Programs
Communication Models Msg Passing Shared Memory Communication may take place using either message passing or shared memory.
System Programs System programs provide a convenient environment for program development and execution.  The can be divided into: File manipulation  Status information File modification Programming language support Program loading and execution Communications Application programs Most users’ view of the operation system is defined by system programs, not the actual system calls.
MS-DOS System Structure  MS-DOS – written to provide the most functionality in the least space not divided into modules Although MS-DOS has some structure, its interfaces and levels of functionality are not well separated
MS-DOS Layer Structure
UNIX System Structure   UNIX – limited by hardware functionality, the original UNIX operating system had limited structuring.  The UNIX OS consists of two separable parts. Systems programs The kernel Consists of everything below the system-call interface and above the physical hardware Provides the file system, CPU scheduling, memory management, and other operating-system functions; a large number of functions for one level.
UNIX System Structure
Layered Approach The operating system is divided into a number of layers (levels), each built on top of lower layers.  The bottom layer (layer 0), is the hardware; the highest (layer N) is the user interface. With modularity, layers are selected such that each uses functions (operations) and services of only lower-level layers.
An Operating System Layer
OS/2 Layer Structure
Microkernel System Structure  Moves as much from the kernel into “ user ” space. Communication takes place between user modules using message passing. Benefits: - easier to extend a microkernel - easier to port the operating system to new architectures - more reliable (less code is running in kernel mode) - more secure
Windows NT Client-Server Structure
Virtual Machines A  virtual machine  takes the layered approach to its logical conclusion.  It treats hardware and the operating system kernel as though they were all hardware. A virtual machine provides an interface  identical  to the underlying bare hardware. The operating system creates the illusion of multiple processes, each executing on its own processor with its own (virtual) memory.
Virtual Machines (Cont.) The resources of the physical computer are shared to create the virtual machines. CPU scheduling can create the appearance that users have their own processor. Spooling and a file system can provide virtual card readers and virtual line printers. A normal user time-sharing terminal serves as the virtual machine operator’s console.
System Models Non-virtual Machine Virtual Machine
Advantages/Disadvantages of Virtual Machines  The virtual-machine concept provides complete protection of system resources since each virtual machine is isolated from all other virtual machines.  This isolation, however, permits no direct sharing of resources. A virtual-machine system is a perfect vehicle for operating-systems research and development.  System development is done on the virtual machine, instead of on a physical machine and so does not disrupt normal system operation. The virtual machine concept is difficult to implement due to the effort required to provide an  exact  duplicate to the underlying machine.
Java Virtual Machine Compiled Java programs are platform-neutral bytecodes executed by a Java Virtual Machine (JVM). JVM consists of - class loader - class verifier - runtime interpreter Just-In-Time (JIT) compilers increase performance
Java Virtual Machine
System Design Goals User goals – operating system should be convenient to use, easy to learn, reliable, safe, and fast. System goals – operating system should be easy to design, implement, and maintain, as well as flexible, reliable, error-free, and efficient.
Mechanisms and Policies Mechanisms determine how to do something, policies decide what will be done. The separation of policy from mechanism is a very important principle, it allows maximum flexibility if policy decisions are to be changed later.
System Implementation Traditionally written in assembly language, operating systems can now be written in higher-level languages. Code written in a high-level language: can be written faster. is more compact. is easier to understand and debug. An operating system is far easier to  port  (move to some other hardware) if it is written in a high-level language.
System Generation (SYSGEN) Operating systems are designed to run on any of a class of machines; the system must be configured for each specific computer site. SYSGEN program obtains information concerning the specific configuration of the hardware system. Booting  – starting a computer by loading the kernel. Bootstrap program  – code stored in ROM that is able to locate the kernel, load it into memory, and start its execution.

More Related Content

PPTX
Operating system architecture
PPTX
Architecture of operating system
PPT
2. microkernel new
PPTX
Kernel (computing)
PPTX
OPERATING SYSTEM ARCHITECTURE
PPTX
Kernels and its types
PPTX
Operating Systems A-Z
Operating system architecture
Architecture of operating system
2. microkernel new
Kernel (computing)
OPERATING SYSTEM ARCHITECTURE
Kernels and its types
Operating Systems A-Z

What's hot (20)

PPT
Os Ds Arch
DOCX
In a monolithic kernel
PPTX
Microkernel
PPTX
Distributed operating system
PPTX
kernels
PDF
Hybrid kernel
PPTX
Distributed Operating System
PPTX
Operating system kernal
PPTX
Windows Architecture Explained by Stacksol
PPT
Network operating systems
PPTX
Operating system structure
PPTX
Linux kernel
PPTX
Windows 7 Architecture
ODP
Distributed operating system(os)
PPTX
Distributive operating system
PPTX
Monolithic kernel
PPTX
Monolithic kernel
PDF
Operating Systems 1 (3/12) - Architectures
PPTX
Operating system components
Os Ds Arch
In a monolithic kernel
Microkernel
Distributed operating system
kernels
Hybrid kernel
Distributed Operating System
Operating system kernal
Windows Architecture Explained by Stacksol
Network operating systems
Operating system structure
Linux kernel
Windows 7 Architecture
Distributed operating system(os)
Distributive operating system
Monolithic kernel
Monolithic kernel
Operating Systems 1 (3/12) - Architectures
Operating system components
Ad

Viewers also liked (20)

PDF
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
PPT
Cs1 3-operating systems
PPTX
Unix features, posix and single unix specification
PPT
OS Security 2009
PPT
12. Computer Systems Hardware 2
PPT
Operating system security (a brief)
PDF
Plan 9: Not (Only) A Better UNIX
PPTX
Unix ppt
PPTX
Solaris Operating System - Oracle
PPT
Chapter 10 - File System Interface
PPT
16. Computer Systems Basic Software 2
PPT
Chapter 14 - Protection
PPTX
Operating system security
PPTX
Operating System Security
PPTX
Operating system security
PPTX
Operating system security
PPT
Chapter 10
PPT
Intruders and Viruses in Network Security NS9
PDF
Unix - An Introduction
PPTX
System security
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
Cs1 3-operating systems
Unix features, posix and single unix specification
OS Security 2009
12. Computer Systems Hardware 2
Operating system security (a brief)
Plan 9: Not (Only) A Better UNIX
Unix ppt
Solaris Operating System - Oracle
Chapter 10 - File System Interface
16. Computer Systems Basic Software 2
Chapter 14 - Protection
Operating system security
Operating System Security
Operating system security
Operating system security
Chapter 10
Intruders and Viruses in Network Security NS9
Unix - An Introduction
System security
Ad

Similar to OSCh3 (20)

PPT
CH3-OS.PPT operating system structures module
PDF
operating system structure
PPT
Operating System 2
PPTX
Operating System Structures and objectuve.pptx
PPT
PPT
Chapter 2 - Operating System Structures
PPT
OS - Ch2
PDF
operating system structure
PDF
System Structure Notes : comprehensive study
PPT
Ch3: Operating System Structure
PPTX
Design Of Operating System_Lecture_OS_2.pptx
PDF
Operating Systems PPT 1 (1).pdf
PDF
operating systems hybrid notes for computerscience.pdf
PPT
PPT
Os structure
PPTX
chapter2.pptx
PPT
ch3 - operating system structures.ppt
PPTX
Operating System-unit 1.pptxX X A A A A A A A A A A
PPT
Operating-System Structures
PPT
Operating systems structures and their practical applications
CH3-OS.PPT operating system structures module
operating system structure
Operating System 2
Operating System Structures and objectuve.pptx
Chapter 2 - Operating System Structures
OS - Ch2
operating system structure
System Structure Notes : comprehensive study
Ch3: Operating System Structure
Design Of Operating System_Lecture_OS_2.pptx
Operating Systems PPT 1 (1).pdf
operating systems hybrid notes for computerscience.pdf
Os structure
chapter2.pptx
ch3 - operating system structures.ppt
Operating System-unit 1.pptxX X A A A A A A A A A A
Operating-System Structures
Operating systems structures and their practical applications

More from Joe Christensen (20)

PPS
Live a life_that_matters
PDF
Advanced Comuter Architecture Ch6 Problem Solutions
PDF
Advanced Computer Architecture chapter 5 problem solutions
PDF
Advanced Computer Architecture Chapter 123 Problems Solution
PPS
Two Choices
ODP
IEEE 12207
PPT
Lecture 13
PPT
Lecture 15
PPT
Lecture 12
PPT
Lecture 11
PPT
Lecture 8 9
PPT
Lecture 10
PPT
Lecture 7n
PPT
Lecture 6
PPT
Lecture 5
PPT
Lecture 4
PPT
Lecture 14
PPT
Moble Communication
Live a life_that_matters
Advanced Comuter Architecture Ch6 Problem Solutions
Advanced Computer Architecture chapter 5 problem solutions
Advanced Computer Architecture Chapter 123 Problems Solution
Two Choices
IEEE 12207
Lecture 13
Lecture 15
Lecture 12
Lecture 11
Lecture 8 9
Lecture 10
Lecture 7n
Lecture 6
Lecture 5
Lecture 4
Lecture 14
Moble Communication

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Modernizing your data center with Dell and AMD
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Big Data Technologies - Introduction.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Monthly Chronicles - July 2025
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
“AI and Expert System Decision Support & Business Intelligence Systems”
Modernizing your data center with Dell and AMD
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Big Data Technologies - Introduction.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

OSCh3

  • 1. Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation
  • 2. Common System Components Process Management Main Memory Management File Management I/O System Management Secondary Management Networking Protection System Command-Interpreter System
  • 3. Process Management A process is a program in execution. A process needs certain resources, including CPU time, memory, files, and I/O devices, to accomplish its task. The operating system is responsible for the following activities in connection with process management. Process creation and deletion. process suspension and resumption. Provision of mechanisms for: process synchronization process communication
  • 4. Main-Memory Management Memory is a large array of words or bytes, each with its own address. It is a repository of quickly accessible data shared by the CPU and I/O devices. Main memory is a volatile storage device. It loses its contents in the case of system failure. The operating system is responsible for the following activities in connections with memory management: Keep track of which parts of memory are currently being used and by whom. Decide which processes to load when memory space becomes available. Allocate and deallocate memory space as needed.
  • 5. File Management A file is a collection of related information defined by its creator. Commonly, files represent programs (both source and object forms) and data. The operating system is responsible for the following activities in connections with file management: File creation and deletion. Directory creation and deletion. Support of primitives for manipulating files and directories. Mapping files onto secondary storage. File backup on stable (nonvolatile) storage media.
  • 6. I/O System Management The I/O system consists of: A buffer-caching system A general device-driver interface Drivers for specific hardware devices
  • 7. Secondary-Storage Management Since main memory ( primary storage ) is volatile and too small to accommodate all data and programs permanently, the computer system must provide secondary storage to back up main memory. Most modern computer systems use disks as the principle on-line storage medium, for both programs and data. The operating system is responsible for the following activities in connection with disk management: Free space management Storage allocation Disk scheduling
  • 8. Networking (Distributed Systems) A distributed system is a collection processors that do not share memory or a clock. Each processor has its own local memory. The processors in the system are connected through a communication network. Communication takes place using a protocol. A distributed system provides user access to various system resources. Access to a shared resource allows: Computation speed-up Increased data availability Enhanced reliability
  • 9. Protection System Protection refers to a mechanism for controlling access by programs, processes, or users to both system and user resources. The protection mechanism must: distinguish between authorized and unauthorized usage. specify the controls to be imposed. provide a means of enforcement.
  • 10. Command-Interpreter System Many commands are given to the operating system by control statements which deal with: process creation and management I/O handling secondary-storage management main-memory management file-system access protection networking
  • 11. Command-Interpreter System (Cont.) The program that reads and interprets control statements is called variously: command-line interpreter shell (in UNIX) Its function is to get and execute the next command statement.
  • 12. Operating System Services Program execution – system capability to load a program into memory and to run it. I/O operations – since user programs cannot execute I/O operations directly, the operating system must provide some means to perform I/O. File-system manipulation – program capability to read, write, create, and delete files. Communications – exchange of information between processes executing either on the same computer or on different systems tied together by a network. Implemented via shared memory or message passing . Error detection – ensure correct computing by detecting errors in the CPU and memory hardware, in I/O devices, or in user programs.
  • 13. Additional Operating System Functions Additional functions exist not for helping the user, but rather for ensuring efficient system operations. Resource allocation – allocating resources to multiple users or multiple jobs running at the same time. Accounting – keep track of and record which users use how much and what kinds of computer resources for account billing or for accumulating usage statistics. Protection – ensuring that all access to system resources is controlled.
  • 14. System Calls System calls provide the interface between a running program and the operating system. Generally available as assembly-language instructions. Languages defined to replace assembly language for systems programming allow system calls to be made directly (e.g., C, C++) Three general methods are used to pass parameters between a running program and the operating system. Pass parameters in registers . Store the parameters in a table in memory, and the table address is passed as a parameter in a register. Push (store) the parameters onto the stack by the program, and pop off the stack by operating system.
  • 15. Passing of Parameters As A Table
  • 16. Types of System Calls Process control File management Device management Information maintenance Communications
  • 17. MS-DOS Execution At System Start-up Running a Program
  • 19. Communication Models Msg Passing Shared Memory Communication may take place using either message passing or shared memory.
  • 20. System Programs System programs provide a convenient environment for program development and execution. The can be divided into: File manipulation Status information File modification Programming language support Program loading and execution Communications Application programs Most users’ view of the operation system is defined by system programs, not the actual system calls.
  • 21. MS-DOS System Structure MS-DOS – written to provide the most functionality in the least space not divided into modules Although MS-DOS has some structure, its interfaces and levels of functionality are not well separated
  • 23. UNIX System Structure UNIX – limited by hardware functionality, the original UNIX operating system had limited structuring. The UNIX OS consists of two separable parts. Systems programs The kernel Consists of everything below the system-call interface and above the physical hardware Provides the file system, CPU scheduling, memory management, and other operating-system functions; a large number of functions for one level.
  • 25. Layered Approach The operating system is divided into a number of layers (levels), each built on top of lower layers. The bottom layer (layer 0), is the hardware; the highest (layer N) is the user interface. With modularity, layers are selected such that each uses functions (operations) and services of only lower-level layers.
  • 28. Microkernel System Structure Moves as much from the kernel into “ user ” space. Communication takes place between user modules using message passing. Benefits: - easier to extend a microkernel - easier to port the operating system to new architectures - more reliable (less code is running in kernel mode) - more secure
  • 30. Virtual Machines A virtual machine takes the layered approach to its logical conclusion. It treats hardware and the operating system kernel as though they were all hardware. A virtual machine provides an interface identical to the underlying bare hardware. The operating system creates the illusion of multiple processes, each executing on its own processor with its own (virtual) memory.
  • 31. Virtual Machines (Cont.) The resources of the physical computer are shared to create the virtual machines. CPU scheduling can create the appearance that users have their own processor. Spooling and a file system can provide virtual card readers and virtual line printers. A normal user time-sharing terminal serves as the virtual machine operator’s console.
  • 32. System Models Non-virtual Machine Virtual Machine
  • 33. Advantages/Disadvantages of Virtual Machines The virtual-machine concept provides complete protection of system resources since each virtual machine is isolated from all other virtual machines. This isolation, however, permits no direct sharing of resources. A virtual-machine system is a perfect vehicle for operating-systems research and development. System development is done on the virtual machine, instead of on a physical machine and so does not disrupt normal system operation. The virtual machine concept is difficult to implement due to the effort required to provide an exact duplicate to the underlying machine.
  • 34. Java Virtual Machine Compiled Java programs are platform-neutral bytecodes executed by a Java Virtual Machine (JVM). JVM consists of - class loader - class verifier - runtime interpreter Just-In-Time (JIT) compilers increase performance
  • 36. System Design Goals User goals – operating system should be convenient to use, easy to learn, reliable, safe, and fast. System goals – operating system should be easy to design, implement, and maintain, as well as flexible, reliable, error-free, and efficient.
  • 37. Mechanisms and Policies Mechanisms determine how to do something, policies decide what will be done. The separation of policy from mechanism is a very important principle, it allows maximum flexibility if policy decisions are to be changed later.
  • 38. System Implementation Traditionally written in assembly language, operating systems can now be written in higher-level languages. Code written in a high-level language: can be written faster. is more compact. is easier to understand and debug. An operating system is far easier to port (move to some other hardware) if it is written in a high-level language.
  • 39. System Generation (SYSGEN) Operating systems are designed to run on any of a class of machines; the system must be configured for each specific computer site. SYSGEN program obtains information concerning the specific configuration of the hardware system. Booting – starting a computer by loading the kernel. Bootstrap program – code stored in ROM that is able to locate the kernel, load it into memory, and start its execution.