File management
Download
Report
Transcript File management
OPERATING SYSTEM CONCEPTS
AND PRACTISE
SYSTEM PROGRAMS
System programs provide a convenient
environment for program development and
execution.
They are divided into several categories :
File management : These programs create, delete,
copy, rename, print, dump, list, and generally
manipulate files and directories
Status information : Some system ask for time ,
memory space and related status information while
others are complex.
These programs format and print the output to the
terminal.
Some systems support registry.
File modification: There are several text
editors available to create and modify the
contents of files.
Programming-language support : Compilers,
assemblers, debuggers and interpreters for
common programming languages provided to
user with the operating system.
Program loading and execution : Once a
program is assembled or compiled, it must be
loaded into memory to be executed
Communications : These programs provide
the mechanism for creating virtual
connections among processes, users, and
computer systems.
Most operating systems are supplied with
programs that are useful in solving common
problems or performing common operations.
Such programs include web browsers, word
processors and text formatters, spreadsheets
known as system utilities or system programs
OPERATING SYSTEM STRUCTURE
The operating system is a complex structure
and must be properly designed.
A common approach is to partition the task
into small components rather than have one
monolithic system.
We must know how the components are
interconnected.
Simple Structure
Some systems do not have a well defined
structures such operating systems started as
small and then grew beyond scope.
MS-Dos is an example of such a system which
was designed by few people and grew
popular.
It was written to provide the most
functionality in least space so it was not
divided carefully.
MS-DOS LAYER STRUCTURE
In MS-DOS, the interfaces and levels of
functionality are not well separated.
Application programs are able to access the
basic I/O routines to write directly to the
display and disk drives well separated.
When user program fails the entire system
crashes
UNIX is another system that initially was
limited by hardware functionality.
It consists of two separable parts: the kernel
and the system programs.
The kernel is further separated into a series of
interfaces
The kernel provides the file system, CPU
scheduling, memory management, and other
operating-system functions through system
calls.
This monolithic structure was difficult to
implement and maintain.
LAYERED STRUCTURE
With proper hardware support, operating
systems can be broken into pieces and that
are smaller systems.
The operating system can then retain much
greater control over the computer.
Implementers have more freedom in changing
the inner workings of the system and in
creating modular operating systems
In top down approach the overall
functionalities are determined
A system can be made modular in many ways.
One method is the layered approach, in which
the operating system is broken up into a
number of layers.
The bottom layer (layer 0) is the hardware; the
highest (layer N) is the user interface.
LAYERED OPERATING SYSTEM
An layered O.S is implementation of abstract
object made up of data and the operations
that can manipulate data.
Layer M—consists of data structures and a set
of routines that can be invoked by higher-level
layers.
Further Layer M consists of data structures
and a set of routines invoked by higher level
structures.
ADVANTAGES OF LAYERED APPROACH
Simplicity of construction and debugging.
The layers are selected so that each uses
functions and services of only lower-level
layers.
The first layer can be debugged without any
concern for the rest of the system.
If an error is found during the debugging of a
particular layer, the error must be on that
layer.
DRAWBACK OF LAYERED APPROACH
It involves defining various layers.
The layered approach is less efficient than the
other approaches.
While executing a system call each layer adds
overhead to the system call.
MICROKERNEL
In the mid-1980s, researchers at Carnegie
Mellon University developed an operating
system called Mach that modularized the
kernel using the microkernel approach.
It structures operating system by removing all
nonessential components from the kernel .
It implements them as system and user-level
programs.
This process results into a small kernel
Main function of Microkernel is
provide a communication facility between the
client program and the various services that are
also running in user space
Communication is provided by message
passing
One benefit of the microkernel approach is
ease of extending the operating system.
All new services are added to user space and
consequently do not require modification of
the kernel.
The microkernel provides more security and
reliability
If a service fails the other parts of operating
system remains untouched.
Operating system that uses microkernel
approach are:
Tru64 UNIX provides a UNIX interface to the user,
but it is implemented with a Mach kernel.
QNX is a real-time operating system that provides
services for message passing and process
scheduling
MODULES
The best current methodology for operatingsystem design involves using object-oriented
programming techniques.
This technique creates a modular kernel
The kernel has a set of core components and
dynamically links.
This type of strategy uses dynamically
loadable modules and is common in modern
implementation of UNIX
Solaris Modular Approach
The structure is organized around a core
kernel with seven types of loadable kernel
modules:
Loadable system calls
Scheduling classes
File systems
Executable formats
STREAMS modules
Miscellaneous
Device and bus drivers
Allows the kernel to provide core services
Each core component is separate.
Each talks to the others over known interfaces.
The Apple Macintosh Mac OS X operating
system uses a hybrid structure.
VIRTUAL MACHINES
A virtual machine takes the layered approach
to its logical conclusion. It treats hardware
and the operating system kernel as though
they were all hardware.
A virtual machine provides an interface
identical to the underlying bare hardware.
The operating system creates the illusion of
multiple processes, each executing on its own
processor with its own (virtual) memory
(a) Non virtual machine (b) virtual machine
The virtual-machine concept provides complete
protection of system resources since each virtual
machine is isolated from all other virtual
machines.
Suitable for research and development.
System development is done on the virtual
machine, instead of on a physical machine and so
does not disrupt normal system operation.
The virtual machine concept is difficult to
implement due to the effort required to provide
an exact duplicate to the underlying machine
BENEFITS
Each virtual machine is completely isolated
from all other virtual machines.
Two approaches to provide sharing have been
implemented
System programmers are given their own
virtual machine
System development is done on the virtual
machine instead of on a physical machine.
EXAMPLES OF VIRTUAL MACHINE
VMware Architecture
It is a popular commercial application that
abstracts Intel 80X86 hardware into isolated
virtual machines.
• It runs as an application on a host operating
system such as Windows or Linux.
• It allows this host system to concurrently run
several different guest operating systems as
independent virtual machines.
JAVA VIRTUAL MACHINE
Java is a popular object-oriented programming
language.
Java also provides a specification for a Java
virtual machine—or JVM.
Java program consists of one or more classes.
For each Java class, the compiler produces an
architecture-neutral byte code output (.class)
file that will run on any implementation of the
JVM.
JAVA VIRTUAL MACHINE
The JVM is a specification for an abstract
computer, it consists of a class loader and a
Java interpreter that executes the
architecture-neutral byte code.
The class loader loads the compiled . Class
files.
The verifier checks that the . class file is valid
Java byte code.
It automatically manages memory by
performing garbage collection.
It can be implemented on top of host
operating systems or as a part of web browser.
In hardware on a chip specifically designed to
run Java programs.
If the JVM is implemented in software, the
Java interpreter interprets the byte code
operations one at a time.
SYSTEM BOOT
Operating system must be made available to
hardware so hardware can start it
Small piece of code – bootstrap loader, locates the
kernel, loads it into memory, and starts it
Sometimes two-step process where boot block at
fixed location loads bootstrap loader
When power initialized on system, execution
starts at a fixed memory location
Firmware used to hold initial boot code
OPERATING SYSTEM GENERATION
Operating systems are designed to run on any
of a class of machines; the system must be
configured for each specific computer site.
SYSGEN program obtains information
concerning the specific configuration of the
hardware system.
Booting – starting a computer by loading the
kernel.
Bootstrap program – code stored in ROM that
is able to locate the kernel, load it into
memory, and start its execution.