SlideShare uma empresa Scribd logo
1 de 20
It is a set of program that provide an
interface between hardware, software

and users and manages all the resources
and provide platform where user can

execute all application/program easily.
Device configuration
Controls peripheral devices connected to the computer

File management

Operating
System

Transfers files between main memory and secondary
storage, manages file folders, backup of file ,recovery
of file, protection of file.

Memory management
Allocation and deallocation of memory space.
Decide which process load onto memory when memory
Space become available.

Interface platform
Provide the interface b/w hardware, software and
users.


Network Operating System
 UNIX / Linux / MS Windows2000 Server



Desktop Operating System
 MS Windows 9X/Me / Mac OS / DOS



Mobile Operating System
 Palm OS and Pocket PC
 Batch processing
 Real time processing
 Time sharing processing
•Immediate response is needed.
•For example
anti-missile defense system
airplane landing control system
interrupt error in computer system


efficient
 time spent to execute its programs should be

short


small in size
 memory occupied should be as small as possible



reliable






multi-tasking
multi-programming
parallel processing
buffering
spooling
Without multiprocessing
with multiprocessing

Job 4
Job 3

Job 4
Job 3

Time
Job 1
CPU 1

Job 2

time

Job 1

Job 2
CPU 2

CPU 1
Kernel: Core components of the OS
Process scheduler
 Determines when and for long each process executes
 Memory manager
 Determines when and how memory is allocated to
processes
 Decides what to do when main memory is full
 File system
 Organizes named collections of data in persistent
storage
 Networking
 Enables processes to communicate with one another


There are various types of intruders
Naïve Users – These are kind of people who have a long
nose and have nothing to do. They know less but keep on
checking out places for other people’s data (Mails etc.).
Skilled Users – These are people like inquisitive students
who are more or less skilled and try out ways to access
things they are not meant to just for fun or to learn.
Purposeful Intruders – These people do nasty jobs on
purpose – e.g. Hacking the Military Data of enemy nation,
Hacking confidential data of the rival company, etc.




Viruses
Trojans
worms
Passwords –
Good passwords – Mixture of numbers, letters of different case is a good
security measure. Passwords ideally should not carry any personal information.
These steps make it difficult to guess passwords.
Periodically changing passwords – Some systems allow us to specify
passwords and specify some period within which the password will have to be
changed.
Recursive Passwords – This is a technology in which each time a password is
used, it is re-encrypted or changed automatically. The user is given a list of
passwords for a period of time. If that list is secured, the user’s data is secured.





Operating system book by galvin
www.wepapers.com
www.pucomp.org
www.authorstream.com
Operating System

Mais conteúdo relacionado

Mais procurados (7)

340 week5assign3present
340 week5assign3present340 week5assign3present
340 week5assign3present
 
Advantages and Disadvantages of Simulation SlideShare
Advantages and Disadvantages of Simulation SlideShareAdvantages and Disadvantages of Simulation SlideShare
Advantages and Disadvantages of Simulation SlideShare
 
Is roles
Is rolesIs roles
Is roles
 
Os
Os Os
Os
 
operating system
operating systemoperating system
operating system
 
computer Softwre in nursing
computer Softwre in nursing computer Softwre in nursing
computer Softwre in nursing
 
What is network
What is networkWhat is network
What is network
 

Destaque

Blade server technology report
Blade server technology reportBlade server technology report
Blade server technology report
Sarath Thalekkara
 
HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009
Louis Göhl
 
HP Blades Presentation
HP Blades PresentationHP Blades Presentation
HP Blades Presentation
Bhavin Vyas
 

Destaque (14)

Hp Virtual Connect
Hp Virtual ConnectHp Virtual Connect
Hp Virtual Connect
 
HP BladeSystem Interconnects
HP BladeSystem InterconnectsHP BladeSystem Interconnects
HP BladeSystem Interconnects
 
Hp Blade Server
Hp Blade ServerHp Blade Server
Hp Blade Server
 
Blade server
Blade serverBlade server
Blade server
 
3PAR and VMWare
3PAR and VMWare3PAR and VMWare
3PAR and VMWare
 
HP C7000 Cconfiguration Guide v.10
HP C7000 Cconfiguration Guide v.10HP C7000 Cconfiguration Guide v.10
HP C7000 Cconfiguration Guide v.10
 
HP Virtual Connect technical fundamental101 v2.1
HP Virtual Connect technical fundamental101   v2.1HP Virtual Connect technical fundamental101   v2.1
HP Virtual Connect technical fundamental101 v2.1
 
Storage Event: HP 3PAR live erleben
Storage Event: HP 3PAR live erlebenStorage Event: HP 3PAR live erleben
Storage Event: HP 3PAR live erleben
 
Blade server technology report
Blade server technology reportBlade server technology report
Blade server technology report
 
blade server
blade serverblade server
blade server
 
HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009
 
Blade server
Blade serverBlade server
Blade server
 
HP Blades Presentation
HP Blades PresentationHP Blades Presentation
HP Blades Presentation
 
HP 3Par StoreServ Storage: HP All Flash Array SSD
HP 3Par StoreServ Storage: HP All Flash Array SSDHP 3Par StoreServ Storage: HP All Flash Array SSD
HP 3Par StoreServ Storage: HP All Flash Array SSD
 

Semelhante a Operating System

chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
dejenehundaol91
 
Lecture 3,4 operating systems
Lecture 3,4   operating systemsLecture 3,4   operating systems
Lecture 3,4 operating systems
Pradeep Kumar TS
 
Lecture 3,4 operating systems
Lecture 3,4   operating systemsLecture 3,4   operating systems
Lecture 3,4 operating systems
Pradeep Kumar TS
 

Semelhante a Operating System (20)

Os structure
Os structureOs structure
Os structure
 
Operating system
Operating systemOperating system
Operating system
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
2 opreating system
2 opreating system2 opreating system
2 opreating system
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
operating system structure
operating system structureoperating system structure
operating system structure
 
list of all Functions of operating system.pptx
list of all Functions of operating system.pptxlist of all Functions of operating system.pptx
list of all Functions of operating system.pptx
 
Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
 
Operating system v1 d1
Operating system v1 d1Operating system v1 d1
Operating system v1 d1
 
Operating System Simple Introduction
Operating System Simple IntroductionOperating System Simple Introduction
Operating System Simple Introduction
 
Operating system
Operating systemOperating system
Operating system
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
 
Operating System
Operating SystemOperating System
Operating System
 
Lecture 3,4 operating systems
Lecture 3,4   operating systemsLecture 3,4   operating systems
Lecture 3,4 operating systems
 
Lecture 3,4 operating systems
Lecture 3,4   operating systemsLecture 3,4   operating systems
Lecture 3,4 operating systems
 
Operating System Introduction
Operating System IntroductionOperating System Introduction
Operating System Introduction
 
Ram iit ppt
Ram iit pptRam iit ppt
Ram iit ppt
 
Operating System Introduction
Operating System IntroductionOperating System Introduction
Operating System Introduction
 

Mais de Divam Goyal (20)

How Social media Effect Social life
How Social media Effect Social lifeHow Social media Effect Social life
How Social media Effect Social life
 
Mars the red_planet
Mars the red_planetMars the red_planet
Mars the red_planet
 
ISO Certificate
ISO CertificateISO Certificate
ISO Certificate
 
Technology
TechnologyTechnology
Technology
 
Piano and keyboard
Piano and keyboardPiano and keyboard
Piano and keyboard
 
SOPA
SOPASOPA
SOPA
 
Steganography
SteganographySteganography
Steganography
 
Input device
Input deviceInput device
Input device
 
New energy resources
New energy resourcesNew energy resources
New energy resources
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Inflection
InflectionInflection
Inflection
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Steganography
SteganographySteganography
Steganography
 
Biometrics
Biometrics Biometrics
Biometrics
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Big bazaar
Big bazaarBig bazaar
Big bazaar
 
Brain rules
Brain rulesBrain rules
Brain rules
 
Bhagat Singh
Bhagat SinghBhagat Singh
Bhagat Singh
 
Apple
AppleApple
Apple
 
Android
AndroidAndroid
Android
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Operating System

  • 1.
  • 2. It is a set of program that provide an interface between hardware, software and users and manages all the resources and provide platform where user can execute all application/program easily.
  • 3. Device configuration Controls peripheral devices connected to the computer File management Operating System Transfers files between main memory and secondary storage, manages file folders, backup of file ,recovery of file, protection of file. Memory management Allocation and deallocation of memory space. Decide which process load onto memory when memory Space become available. Interface platform Provide the interface b/w hardware, software and users.
  • 4.  Network Operating System  UNIX / Linux / MS Windows2000 Server  Desktop Operating System  MS Windows 9X/Me / Mac OS / DOS  Mobile Operating System  Palm OS and Pocket PC
  • 5.  Batch processing  Real time processing  Time sharing processing
  • 6.
  • 7. •Immediate response is needed. •For example anti-missile defense system airplane landing control system interrupt error in computer system
  • 8.
  • 9.  efficient  time spent to execute its programs should be short  small in size  memory occupied should be as small as possible  reliable
  • 11.
  • 12.
  • 13. Without multiprocessing with multiprocessing Job 4 Job 3 Job 4 Job 3 Time Job 1 CPU 1 Job 2 time Job 1 Job 2 CPU 2 CPU 1
  • 14.
  • 15. Kernel: Core components of the OS Process scheduler  Determines when and for long each process executes  Memory manager  Determines when and how memory is allocated to processes  Decides what to do when main memory is full  File system  Organizes named collections of data in persistent storage  Networking  Enables processes to communicate with one another  
  • 16. There are various types of intruders Naïve Users – These are kind of people who have a long nose and have nothing to do. They know less but keep on checking out places for other people’s data (Mails etc.). Skilled Users – These are people like inquisitive students who are more or less skilled and try out ways to access things they are not meant to just for fun or to learn. Purposeful Intruders – These people do nasty jobs on purpose – e.g. Hacking the Military Data of enemy nation, Hacking confidential data of the rival company, etc.
  • 18. Passwords – Good passwords – Mixture of numbers, letters of different case is a good security measure. Passwords ideally should not carry any personal information. These steps make it difficult to guess passwords. Periodically changing passwords – Some systems allow us to specify passwords and specify some period within which the password will have to be changed. Recursive Passwords – This is a technology in which each time a password is used, it is re-encrypted or changed automatically. The user is given a list of passwords for a period of time. If that list is secured, the user’s data is secured.
  • 19.     Operating system book by galvin www.wepapers.com www.pucomp.org www.authorstream.com

Notas do Editor

  1. Operating system:a collection of programs which control the resources of a computer systemwritten in low-level languages (i.e. machine-dependent)an interface between the users and the hardwareWhen the computer is on, OS will first load into the main memoryAllows convenient usage; hides the tedious stuffAllows efficient usage; parallel activity, avoids wasted cycles
  2. Process Management – Managing the programs that are running.Memory Management – Managing and rationing the memory between processes and data.Storage Management – Managing the permanent Storage of data on disks or other mediaI/O Management – Managing the input and outputDevice / Resource Management – Managing devices and resources and allowing the users to share the resourcesSecurity and Protection – Securing the system against possible unauthorized access to data or any other entity. Protecting the parts of the system against damage.Booting the System and getting it ready to work.Data communications – Providing interface to connect to other computers or allowing others to
  3. Batch operating system:Jobs, together with input data, are fed into the system in a batch. The jobs are then run one after another.No job can be started until previous job is completedTime Sharing Operating System:Each user is given a time slice to interact with the CPU. The size of the time slice will depend on the system.Each user is served in sequence.Real time operating system:immediate response is needed.For example anti-missile defense systemairplane landing control systeminterrupt error in computer system
  4. Multitasking operating systemTo handle 2 or more programs at the same time from a single user ‘s perceptionCPU can only perform one task at a time, however, it runs so fast that 2 or more jobs seem to execute at the same time Multiprogramming2 or more programs store in the main memory at the same timewhen one job reeds to wait (e.g. I/O operation), CPU switch to another job to executewhen the first job finishes waiting, CPU will get back the first job to executeBufferinga temporary storage area (buffers) to read data from input device or send data to the output devicekeep CPU busybecause I/O operation is slow.Spooling:a larger buffer from hard diskbuffer store the data through I/O operationbecause I/O operation is slow and CPU operation is fast .Parallel processing:use 2 or more CPUs to handle jobscomputer networking
  5. Some well known security threatsViruses – These are malicious codes that believe in infecting some data and spread. They generally come from infected removable storage media (floppies, CD’s) or recently they are also coming with mails on the internet. The viral code is generally executed by the user unknowingly. They reside as a part of some important program, file or metadata (Partition Table, Boot Sector etc.) and are activated whenever the innocent infected data is read or executed. When active it tries to search for other such files or data where it can copy itself. Trojans – These are sent to a person by an intruder on purpose. The program is sent with some innocent looking program or file and the user runs it unknowingly. The program when active acts as a server. The intruder can connect to it from the remote machine and command it to do malicious jobs in the recipient's computer.Worms – These consist of two parts one is called the loader and the other is the worm itself. The loader is rather innocent program which is sent to somebody on the network. This loader later on loads the worm onto this computer. Whenever the worm finds that the network is on it sends the loader to the connected machines and thus it spreads.