2. This file system can be viewed logically
consist of following parts:
Disk structure
Disk scheduling
Disk Management
Swap-space Management
3. Disk provide the bulk of secondary storage
Magnetic tape was used an early secondary storage
medium
Modern disk drives are addressed as large one-
dimensional arrays of logical blocks
The logical blocks is the smallest unit of tranfer.
The one-dimensional array of logical blocks is
mapped onto the sectors of the disk sequentially.
It is difficult to perform two reasons
Most disks have some defective sectors.
The number of sectors per track is not a
constant on some drives.
4. The disk drives has fast access time and disk bandwidth
The access time has two major components.
Seek time
Rotational latency
The disk bandwidth is the total number of byes
transferred, divided by the total time between the
first request for service and the completion of the last
transfer.
The request specifies several pieces of information
I. Whether this operation is input or output
II. What the disk address for the transfer is
III. What the memory address for the transfer is
IV. What the number of bytes to the transferred is
5. The simplest form of disk scheduling is the first
come, first-served(FCFS) algorithm.
The algorithm does not provide the fastest
services.
SSTF Scheduling
It seems reasonable to service all the requests
close to the current head position, before
moving the head far away to service.
The assumption is the basis for the shortest-
seek-time-first algorithm
The SSTF algorithm selects the request with
the minimum seek time from the current head
position
6. In the scan algorithm the disk arm starts at one
end of the disk, and moves toward the other end.
The direction of head movement is reversed, and
servicing continues.
The scan algorithm is sometimes called the
elevator algorithm
C- SCAN scheduling
Circular scan scheduling is a variant of SCAN designed
to provide a more wait time
The C-SCAN scheduling algorithm treats the cylinders
as a circular list that wraps around from the final cylinder
to the first one.
7. • The scheduling algorithms described the seek
distances for modern disks, the rotational latency
Can be nearly as large as the average seek time.
• But it is difficult for the operating system to
scheduled for improved rotational latency because
modern disks do not disclose the physical location of
logical blocks.
8. Disk Formatting
• A new magnetic disk is a blank slate.
• It must be divided into sectors that the disk controller
can read and write. This process is called Low level
formatting
• A sector number and an error-correcting code.
• The operating system still needs to record its own data
structures.
• In two steps
• The first step is two partition the disk into one or more
groups of cylinders
• The second step is logical formatting.
• In this step the operating system stores the initial file
system data structures into the disk
9. The bootstrap is stored in read only memory
The full bootstrap program is stored in a partition
called the boot blocks, at a fixed location on the
disk.
A disk that has a boot partition is called a boot
disk or system disk.
Bad blocks
Most frequently, one or more sectors become defective.
Most disks even come form the factory with bad blocks
This scheme is known as sector sparing or forwarding
10. Swap-space management is another low-level task of the
operating system
The main goal for the design and implementation of swap
space is to provide the best throughput for the
Virtual memory system
Swap-space use
Swap space is used in various ways by different operating systems,
depending on the implemented memory-management
Algorithms.
Swap-space Location
A swap space can reside in two places.
Swap space can be carved out of the normal file system or it can be
in a seperated disk partition.
11.
12. Windows 2000 Operating system is a 32-bit
preemptive multitasking operating system for Intel
pentium and later microprocessor.
In 1980 Microsoft and IBM cooperated to develop
the OS/2 operating system in single processor Intel
80286
Microsoft developed a portable operating system
that supported both the application system.
There are four versions of windows 2000
The professional version intended for desktop use.
The other three are server version datacenter
version.
13. The design goals that Micros0ft has stated for
windows 2000 include Extensibility, portability,
compatibility, performance.
Extensibility refers to the capacity of the operating
system to keep up advances in computing technology
Windows 2000 uses a client-server model.
Mach operating system and supports multiple
processing by remoter procedure call(RPC).
An operating system is portable and it can be
moved from one hardware architecture to another.
14. The architecture of windows 2000 is a layered
system of modules.
The user-mode subsystems are in two categories
environment subsystems emulate different operating
systems;the subsystems provide security functions.
One of the chief advantages of the architecture is
the intreactions between modules can be kept simple
remainder of this section describes these layers and
subsytems.
15. HAL is the layer of software that hides hardware
differences from the operating system,virtual-machine
interface that is used by the kernel,the exculive and
device drivers.
One advantage of this approach is that only a single
of each device driver is needed-it can run on all
hardware flatform will porting the driver code.
16. The kernal of windows 2000 provides the fundation
for the executive and subsystems.
kernal uses to sets of objects. The first set
comparises the dispatcher.
Dispatcher objects control dispatching and
synchoronous the event object is used to record an
event occurances.
Synchronize the later with some action A semaphore
objects acts as a counter or gate to control the number
that access some resource.
The thread object is the entity that is run kernal and
is associated with a process object.
17. Timer objects are used to keep track of the time
and
and to signal time outs when operations and need to
be interrupted
The second set of kernal objects comparises the
control objects.
The power states object to check whether the
power
a process object represents the virtual address
space and control.
The system uses the profile object to measure the
amount of time used by a amount of code
18. Windows 2000 uses the process and threads for
executable code .
Each process has one or more threads. Each thread
has its own state.
It includes a priority, processor, affinity, and
accounting information.
The six possible thread states or ready, stand by ,
running, waiting, and terminated.
19. Ready means waiting to run.
The highest priority thread is moved to the standby
state.
A thread is running when it is executing on a
processor
A thread is in the waiting state when it is waiting for
a signal
A new thread is in the transition state while it is
waiting resourcs necessary for execlution
A thread enters the terminated state finishes
execution
20. Kernal also provides trap handling for exceptions
and interrupts that are used by hardware or software
windows 2000 defines several architecture
exceptions including memory-access violation integer
overflow or underflow, integer divide by zero, floating-
point by zero , illegal instruction , data misalignment,
privileged instruction, read error , guard-page,
violation, paging files, quote exceeded, debugger, point
and debugger, single step.
The exeption dispatcher creates and exception that
contains the reason for the exception and finds an
exception handler deal with it.
21. The kernal uses an interrupted dispatch table to
bind each interrupt that a service routine
Windows 2000 takes advantage of this property to
software interrupts to perform system functions
kernal uses the dispatch interrupt to control thread
context switching to the kernal is running.
It queues a deferred procedure call(DPC) that
contains the address of the function to be executed
and generates interrupt.
They cannot modify its memory: create, acquire, or
wait on objects, call system services or page faults.
22. Third reponsibility of the kernal is to provide low-
level processor synchronization.
The APC mechanism is similar to the DPC algorithm
but was most use.
The APC mechanism enables threads to set up a
procedure call that happen out of the blue at some
future time.
windows 2000 can run on symmetric multiprocessor
machines, so the kernal must prevent two of its
threads from modifying a shared data structure in
same time.
23. The fourth and final responsibility of the kernal is
to provide recovery after a failure
A power fail interrupt which has the second-highest
priority notifies the operating system whenever a
power loss is detected.
The power notify object provides a way for a device
driver to register a routine that is call on power
restoration and ensures that devices get set to the
proper and recovery
27. Windows 2000 supports both peer-to-peer and
client server networking.
The networking components provide data transport,
interprocess communication file sharing across a network,
and the ability to send print jobs to remote printers.
Protocols
Distributed processing Mechanisms