Operating System (Types of Operating System) : Department of Computer Science University of Swabi (Khyber Pakhtunkhwa)
Operating System (Types of Operating System) : Department of Computer Science University of Swabi (Khyber Pakhtunkhwa)
Operating System (Types of Operating System) : Department of Computer Science University of Swabi (Khyber Pakhtunkhwa)
Individuals usually have sole use of computer and do not need advanced protection features.
Limitations
The user did not interact directly with the system; instead the user prepared a job, (which
consisted of the program, data, and some control information about the nature of the job in the
form of control cards) and submitted this to the computer operator.
The job was in the form of punch cards, and at some later time the output was
generated by the system user didn’t get to interact with his/her job. The output
consisted of the result of the program.
Speeding up processing
Reduce setup time by batching similar jobs
All FORTAN programs were compiled one after another
CPU idle because of mechanical I/O devices (drawback)
User space
User programs (processes)
Only one process in allow
Jobs scheduling
If several jobs are waiting to be brought in the memory and there is no enough space then
CPU select jobs among them which is know as scheduling
Uses multiprogramming and CPU scheduling to provide portion of time to each user
Example
UNIX, Linux, Windows NT server and Windows 2000 server
Examples
Systems that control scientific experiments, medical imaging systems, industrial control systems
and certain display systems
Well-defined fixed-time constraints. if system does not produce within time constraints it will be
failed.
The occurrence of an event is usually signaled by an interrupt from either the hardware
or the software.
Hardware may trigger an interrupt at any time by sending a signal to the CPU usually by
way of the system bus.
Software may trigger an interrupt by executing a special operation called a system call.
A user or a process may generate a signal (an interrupt to a process)
Concept of privileged instructions also provides us with the means for the user to interact with the
operating system by asking it to perform some designated tasks that only the operating system should
do
Mode bit added to computer hardware to indicate the current mode: monitor (0) or user (1).
User process can request the operating system to perform such tasks for it by executing a system call
We must ensure that a user program could never gain control of the computer in monitor mode (i.e., a
user program that, as part of its execution, stores a new address in the interrupt vector).
Must provide memory protection outside the address space of a process because
it can access and can accidentally overwrite the address space of another process
or memory belong to OS
In order to have memory protection, add two registers that determine the range of legal addresses
a program may access:
Base register – holds the smallest legal physical memory address (starting address of the process).
Limit register – contains the size of the range
Memory outside the defined range is protected using Base and Limit registers.
Timer – interrupts computer after specified period to ensure operating system maintains control.
can be fixed or variable
fixed-rate clock + counter = variable timer
Timer r is decremented every clock tick.
When timer reaches the value 0, an interrupt occurs.
Applications
Timer commonly used to implement time sharing.
Time also used to compute the current time.
Thank you