SlideShare uma empresa Scribd logo
1 de 27
K.KAVIYA(14BIT008)
SUBMITTED TO:
Ms.R.MADHUBALA, MCA.,
This file system can be viewed logically
consist of following parts:
 Disk structure
 Disk scheduling
 Disk Management
 Swap-space Management
 Disk provide the bulk of secondary storage
 Magnetic tape was used an early secondary storage
medium
 Modern disk drives are addressed as large one-
dimensional arrays of logical blocks
 The logical blocks is the smallest unit of tranfer.
 The one-dimensional array of logical blocks is
mapped onto the sectors of the disk sequentially.
 It is difficult to perform two reasons
 Most disks have some defective sectors.
 The number of sectors per track is not a
constant on some drives.
 The disk drives has fast access time and disk bandwidth
 The access time has two major components.
 Seek time
 Rotational latency
 The disk bandwidth is the total number of byes
transferred, divided by the total time between the
first request for service and the completion of the last
transfer.
 The request specifies several pieces of information
I. Whether this operation is input or output
II. What the disk address for the transfer is
III. What the memory address for the transfer is
IV. What the number of bytes to the transferred is
The simplest form of disk scheduling is the first
come, first-served(FCFS) algorithm.
The algorithm does not provide the fastest
services.
SSTF Scheduling
 It seems reasonable to service all the requests
close to the current head position, before
moving the head far away to service.
 The assumption is the basis for the shortest-
seek-time-first algorithm
 The SSTF algorithm selects the request with
the minimum seek time from the current head
position
 In the scan algorithm the disk arm starts at one
end of the disk, and moves toward the other end.
 The direction of head movement is reversed, and
servicing continues.
 The scan algorithm is sometimes called the
elevator algorithm
C- SCAN scheduling
 Circular scan scheduling is a variant of SCAN designed
to provide a more wait time
 The C-SCAN scheduling algorithm treats the cylinders
as a circular list that wraps around from the final cylinder
to the first one.
• The scheduling algorithms described the seek
distances for modern disks, the rotational latency
Can be nearly as large as the average seek time.
• But it is difficult for the operating system to
scheduled for improved rotational latency because
modern disks do not disclose the physical location of
logical blocks.
Disk Formatting
• A new magnetic disk is a blank slate.
• It must be divided into sectors that the disk controller
can read and write. This process is called Low level
formatting
• A sector number and an error-correcting code.
• The operating system still needs to record its own data
structures.
• In two steps
• The first step is two partition the disk into one or more
groups of cylinders
• The second step is logical formatting.
• In this step the operating system stores the initial file
system data structures into the disk
 The bootstrap is stored in read only memory
 The full bootstrap program is stored in a partition
called the boot blocks, at a fixed location on the
disk.
 A disk that has a boot partition is called a boot
disk or system disk.
Bad blocks
 Most frequently, one or more sectors become defective.
 Most disks even come form the factory with bad blocks
 This scheme is known as sector sparing or forwarding
Swap-space management is another low-level task of the
operating system
The main goal for the design and implementation of swap
space is to provide the best throughput for the
Virtual memory system
Swap-space use
Swap space is used in various ways by different operating systems,
depending on the implemented memory-management
Algorithms.
Swap-space Location
 A swap space can reside in two places.
 Swap space can be carved out of the normal file system or it can be
in a seperated disk partition.
 Windows 2000 Operating system is a 32-bit
preemptive multitasking operating system for Intel
pentium and later microprocessor.
 In 1980 Microsoft and IBM cooperated to develop
the OS/2 operating system in single processor Intel
80286
 Microsoft developed a portable operating system
that supported both the application system.
 There are four versions of windows 2000
 The professional version intended for desktop use.
 The other three are server version datacenter
version.
 The design goals that Micros0ft has stated for
windows 2000 include Extensibility, portability,
compatibility, performance.
 Extensibility refers to the capacity of the operating
system to keep up advances in computing technology
 Windows 2000 uses a client-server model.
 Mach operating system and supports multiple
processing by remoter procedure call(RPC).
 An operating system is portable and it can be
moved from one hardware architecture to another.
 The architecture of windows 2000 is a layered
system of modules.
 The user-mode subsystems are in two categories
environment subsystems emulate different operating
systems;the subsystems provide security functions.
 One of the chief advantages of the architecture is
the intreactions between modules can be kept simple
remainder of this section describes these layers and
subsytems.
 HAL is the layer of software that hides hardware
differences from the operating system,virtual-machine
interface that is used by the kernel,the exculive and
device drivers.
 One advantage of this approach is that only a single
of each device driver is needed-it can run on all
hardware flatform will porting the driver code.
 The kernal of windows 2000 provides the fundation
for the executive and subsystems.
 kernal uses to sets of objects. The first set
comparises the dispatcher.
 Dispatcher objects control dispatching and
synchoronous the event object is used to record an
event occurances.
 Synchronize the later with some action A semaphore
objects acts as a counter or gate to control the number
that access some resource.
 The thread object is the entity that is run kernal and
is associated with a process object.
 Timer objects are used to keep track of the time
and
and to signal time outs when operations and need to
be interrupted
 The second set of kernal objects comparises the
control objects.
 The power states object to check whether the
power
a process object represents the virtual address
space and control.
 The system uses the profile object to measure the
amount of time used by a amount of code
 Windows 2000 uses the process and threads for
executable code .
 Each process has one or more threads. Each thread
has its own state.
 It includes a priority, processor, affinity, and
accounting information.
 The six possible thread states or ready, stand by ,
running, waiting, and terminated.
 Ready means waiting to run.
 The highest priority thread is moved to the standby
state.
 A thread is running when it is executing on a
processor
 A thread is in the waiting state when it is waiting for
a signal
 A new thread is in the transition state while it is
waiting resourcs necessary for execlution
 A thread enters the terminated state finishes
execution
 Kernal also provides trap handling for exceptions
and interrupts that are used by hardware or software
 windows 2000 defines several architecture
exceptions including memory-access violation integer
overflow or underflow, integer divide by zero, floating-
point by zero , illegal instruction , data misalignment,
privileged instruction, read error , guard-page,
violation, paging files, quote exceeded, debugger, point
and debugger, single step.
 The exeption dispatcher creates and exception that
contains the reason for the exception and finds an
exception handler deal with it.
 The kernal uses an interrupted dispatch table to
bind each interrupt that a service routine
 Windows 2000 takes advantage of this property to
software interrupts to perform system functions
 kernal uses the dispatch interrupt to control thread
context switching to the kernal is running.
 It queues a deferred procedure call(DPC) that
contains the address of the function to be executed
and generates interrupt.
 They cannot modify its memory: create, acquire, or
wait on objects, call system services or page faults.
 Third reponsibility of the kernal is to provide low-
level processor synchronization.
 The APC mechanism is similar to the DPC algorithm
but was most use.
 The APC mechanism enables threads to set up a
procedure call that happen out of the blue at some
future time.
 windows 2000 can run on symmetric multiprocessor
machines, so the kernal must prevent two of its
threads from modifying a shared data structure in
same time.
 The fourth and final responsibility of the kernal is
to provide recovery after a failure
 A power fail interrupt which has the second-highest
priority notifies the operating system whenever a
power loss is detected.
 The power notify object provides a way for a device
driver to register a routine that is call on power
restoration and ensures that devices get set to the
proper and recovery
 Object manager
 Virtual- Memory Manager
 process manager
 Local-procedure-call facility
 I/O manager
 Security reference monitor
 Plug-and-play manager
MS-DOS subsystem
16-bit Windows Environment
 Win32 Environment
 POSIX subsystem
 OS/2 subsystem
 Logon and security subsystem
• Internal layout
• Recovery
• Security
• Volume Management andFault Tolerance
• Compression
• Reparse Points
 Windows 2000 supports both peer-to-peer and
client server networking.
The networking components provide data transport,
interprocess communication file sharing across a network,
and the ability to send print jobs to remote printers.
 Protocols
 Distributed processing Mechanisms

Mais conteúdo relacionado

Mais procurados

Mais procurados (18)

Io sy.stemppt
Io sy.stempptIo sy.stemppt
Io sy.stemppt
 
Device Driver in WinCE 6.0 R2
Device Driver in WinCE 6.0 R2Device Driver in WinCE 6.0 R2
Device Driver in WinCE 6.0 R2
 
Cs8493 unit 2
Cs8493 unit 2Cs8493 unit 2
Cs8493 unit 2
 
Ch2
Ch2Ch2
Ch2
 
Cs8493 unit 3
Cs8493 unit 3Cs8493 unit 3
Cs8493 unit 3
 
Process management
Process managementProcess management
Process management
 
Chapter 9 OS
Chapter 9 OSChapter 9 OS
Chapter 9 OS
 
Understanding Modern Device Drivers
Understanding Modern Device DriversUnderstanding Modern Device Drivers
Understanding Modern Device Drivers
 
Driver development – memory management
Driver development – memory managementDriver development – memory management
Driver development – memory management
 
Kernel
KernelKernel
Kernel
 
Kernel (OS)
Kernel (OS)Kernel (OS)
Kernel (OS)
 
LINUX Device Drivers
LINUX Device DriversLINUX Device Drivers
LINUX Device Drivers
 
UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
 
Cs8493 unit 1
Cs8493 unit 1Cs8493 unit 1
Cs8493 unit 1
 
OSCh21
OSCh21OSCh21
OSCh21
 
My ppt @ bec doms on process management
My ppt @ bec doms on process managementMy ppt @ bec doms on process management
My ppt @ bec doms on process management
 
System components of windows xp
System components of windows xpSystem components of windows xp
System components of windows xp
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 

Destaque

2721 engineering to consulting booz allen hamilton
2721 engineering to consulting  booz allen hamilton2721 engineering to consulting  booz allen hamilton
2721 engineering to consulting booz allen hamiltonCareer Communications Group
 
La energia renovable
La energia renovableLa energia renovable
La energia renovabledaniana9559
 
A escolarização da literatura infantil e juvenil completo
A escolarização da literatura infantil e juvenil completoA escolarização da literatura infantil e juvenil completo
A escolarização da literatura infantil e juvenil completoGeruza Duarte
 
คำสั่งควบคุมของโปรแกรม
คำสั่งควบคุมของโปรแกรมคำสั่งควบคุมของโปรแกรม
คำสั่งควบคุมของโปรแกรมParn Nichakorn
 
ASSESSMENT AND EVALUATION TEST ENGLISH 7
ASSESSMENT AND EVALUATION TEST ENGLISH 7ASSESSMENT AND EVALUATION TEST ENGLISH 7
ASSESSMENT AND EVALUATION TEST ENGLISH 7Pristine Estorque
 
konsep dasar kewirausahaan _2017
konsep dasar kewirausahaan _2017konsep dasar kewirausahaan _2017
konsep dasar kewirausahaan _2017irvan sidik
 

Destaque (11)

Untitled
UntitledUntitled
Untitled
 
La mujer
La mujerLa mujer
La mujer
 
слайд бристоль
слайд бристольслайд бристоль
слайд бристоль
 
2721 engineering to consulting booz allen hamilton
2721 engineering to consulting  booz allen hamilton2721 engineering to consulting  booz allen hamilton
2721 engineering to consulting booz allen hamilton
 
La energia renovable
La energia renovableLa energia renovable
La energia renovable
 
A escolarização da literatura infantil e juvenil completo
A escolarização da literatura infantil e juvenil completoA escolarização da literatura infantil e juvenil completo
A escolarização da literatura infantil e juvenil completo
 
Slider
SliderSlider
Slider
 
คำสั่งควบคุมของโปรแกรม
คำสั่งควบคุมของโปรแกรมคำสั่งควบคุมของโปรแกรม
คำสั่งควบคุมของโปรแกรม
 
ASSESSMENT AND EVALUATION TEST ENGLISH 7
ASSESSMENT AND EVALUATION TEST ENGLISH 7ASSESSMENT AND EVALUATION TEST ENGLISH 7
ASSESSMENT AND EVALUATION TEST ENGLISH 7
 
konsep dasar kewirausahaan _2017
konsep dasar kewirausahaan _2017konsep dasar kewirausahaan _2017
konsep dasar kewirausahaan _2017
 
Kiri ch ko (3)
Kiri ch ko (3)Kiri ch ko (3)
Kiri ch ko (3)
 

Semelhante a Operating system ppt

Semelhante a Operating system ppt (20)

Operation System
Operation SystemOperation System
Operation System
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
Operation System
Operation SystemOperation System
Operation System
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
Os
OsOs
Os
 
os
osos
os
 
I/O System and Case Study
I/O System and Case StudyI/O System and Case Study
I/O System and Case Study
 
UNIT II.pptx
UNIT II.pptxUNIT II.pptx
UNIT II.pptx
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]
 
Walking around linux kernel
Walking around linux kernelWalking around linux kernel
Walking around linux kernel
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
I/O structure slide by Rajalakshmi SKC
I/O structure slide by Rajalakshmi SKCI/O structure slide by Rajalakshmi SKC
I/O structure slide by Rajalakshmi SKC
 
CS403: Operating System : Unit I _merged.pdf
CS403: Operating System :  Unit I _merged.pdfCS403: Operating System :  Unit I _merged.pdf
CS403: Operating System : Unit I _merged.pdf
 
lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categories
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
2337610
23376102337610
2337610
 
Unit vos - File systems
Unit vos - File systemsUnit vos - File systems
Unit vos - File systems
 
Operating system
Operating systemOperating system
Operating system
 
Os
OsOs
Os
 
Os
OsOs
Os
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Operating system ppt

  • 2. This file system can be viewed logically consist of following parts:  Disk structure  Disk scheduling  Disk Management  Swap-space Management
  • 3.  Disk provide the bulk of secondary storage  Magnetic tape was used an early secondary storage medium  Modern disk drives are addressed as large one- dimensional arrays of logical blocks  The logical blocks is the smallest unit of tranfer.  The one-dimensional array of logical blocks is mapped onto the sectors of the disk sequentially.  It is difficult to perform two reasons  Most disks have some defective sectors.  The number of sectors per track is not a constant on some drives.
  • 4.  The disk drives has fast access time and disk bandwidth  The access time has two major components.  Seek time  Rotational latency  The disk bandwidth is the total number of byes transferred, divided by the total time between the first request for service and the completion of the last transfer.  The request specifies several pieces of information I. Whether this operation is input or output II. What the disk address for the transfer is III. What the memory address for the transfer is IV. What the number of bytes to the transferred is
  • 5. The simplest form of disk scheduling is the first come, first-served(FCFS) algorithm. The algorithm does not provide the fastest services. SSTF Scheduling  It seems reasonable to service all the requests close to the current head position, before moving the head far away to service.  The assumption is the basis for the shortest- seek-time-first algorithm  The SSTF algorithm selects the request with the minimum seek time from the current head position
  • 6.  In the scan algorithm the disk arm starts at one end of the disk, and moves toward the other end.  The direction of head movement is reversed, and servicing continues.  The scan algorithm is sometimes called the elevator algorithm C- SCAN scheduling  Circular scan scheduling is a variant of SCAN designed to provide a more wait time  The C-SCAN scheduling algorithm treats the cylinders as a circular list that wraps around from the final cylinder to the first one.
  • 7. • The scheduling algorithms described the seek distances for modern disks, the rotational latency Can be nearly as large as the average seek time. • But it is difficult for the operating system to scheduled for improved rotational latency because modern disks do not disclose the physical location of logical blocks.
  • 8. Disk Formatting • A new magnetic disk is a blank slate. • It must be divided into sectors that the disk controller can read and write. This process is called Low level formatting • A sector number and an error-correcting code. • The operating system still needs to record its own data structures. • In two steps • The first step is two partition the disk into one or more groups of cylinders • The second step is logical formatting. • In this step the operating system stores the initial file system data structures into the disk
  • 9.  The bootstrap is stored in read only memory  The full bootstrap program is stored in a partition called the boot blocks, at a fixed location on the disk.  A disk that has a boot partition is called a boot disk or system disk. Bad blocks  Most frequently, one or more sectors become defective.  Most disks even come form the factory with bad blocks  This scheme is known as sector sparing or forwarding
  • 10. Swap-space management is another low-level task of the operating system The main goal for the design and implementation of swap space is to provide the best throughput for the Virtual memory system Swap-space use Swap space is used in various ways by different operating systems, depending on the implemented memory-management Algorithms. Swap-space Location  A swap space can reside in two places.  Swap space can be carved out of the normal file system or it can be in a seperated disk partition.
  • 11.
  • 12.  Windows 2000 Operating system is a 32-bit preemptive multitasking operating system for Intel pentium and later microprocessor.  In 1980 Microsoft and IBM cooperated to develop the OS/2 operating system in single processor Intel 80286  Microsoft developed a portable operating system that supported both the application system.  There are four versions of windows 2000  The professional version intended for desktop use.  The other three are server version datacenter version.
  • 13.  The design goals that Micros0ft has stated for windows 2000 include Extensibility, portability, compatibility, performance.  Extensibility refers to the capacity of the operating system to keep up advances in computing technology  Windows 2000 uses a client-server model.  Mach operating system and supports multiple processing by remoter procedure call(RPC).  An operating system is portable and it can be moved from one hardware architecture to another.
  • 14.  The architecture of windows 2000 is a layered system of modules.  The user-mode subsystems are in two categories environment subsystems emulate different operating systems;the subsystems provide security functions.  One of the chief advantages of the architecture is the intreactions between modules can be kept simple remainder of this section describes these layers and subsytems.
  • 15.  HAL is the layer of software that hides hardware differences from the operating system,virtual-machine interface that is used by the kernel,the exculive and device drivers.  One advantage of this approach is that only a single of each device driver is needed-it can run on all hardware flatform will porting the driver code.
  • 16.  The kernal of windows 2000 provides the fundation for the executive and subsystems.  kernal uses to sets of objects. The first set comparises the dispatcher.  Dispatcher objects control dispatching and synchoronous the event object is used to record an event occurances.  Synchronize the later with some action A semaphore objects acts as a counter or gate to control the number that access some resource.  The thread object is the entity that is run kernal and is associated with a process object.
  • 17.  Timer objects are used to keep track of the time and and to signal time outs when operations and need to be interrupted  The second set of kernal objects comparises the control objects.  The power states object to check whether the power a process object represents the virtual address space and control.  The system uses the profile object to measure the amount of time used by a amount of code
  • 18.  Windows 2000 uses the process and threads for executable code .  Each process has one or more threads. Each thread has its own state.  It includes a priority, processor, affinity, and accounting information.  The six possible thread states or ready, stand by , running, waiting, and terminated.
  • 19.  Ready means waiting to run.  The highest priority thread is moved to the standby state.  A thread is running when it is executing on a processor  A thread is in the waiting state when it is waiting for a signal  A new thread is in the transition state while it is waiting resourcs necessary for execlution  A thread enters the terminated state finishes execution
  • 20.  Kernal also provides trap handling for exceptions and interrupts that are used by hardware or software  windows 2000 defines several architecture exceptions including memory-access violation integer overflow or underflow, integer divide by zero, floating- point by zero , illegal instruction , data misalignment, privileged instruction, read error , guard-page, violation, paging files, quote exceeded, debugger, point and debugger, single step.  The exeption dispatcher creates and exception that contains the reason for the exception and finds an exception handler deal with it.
  • 21.  The kernal uses an interrupted dispatch table to bind each interrupt that a service routine  Windows 2000 takes advantage of this property to software interrupts to perform system functions  kernal uses the dispatch interrupt to control thread context switching to the kernal is running.  It queues a deferred procedure call(DPC) that contains the address of the function to be executed and generates interrupt.  They cannot modify its memory: create, acquire, or wait on objects, call system services or page faults.
  • 22.  Third reponsibility of the kernal is to provide low- level processor synchronization.  The APC mechanism is similar to the DPC algorithm but was most use.  The APC mechanism enables threads to set up a procedure call that happen out of the blue at some future time.  windows 2000 can run on symmetric multiprocessor machines, so the kernal must prevent two of its threads from modifying a shared data structure in same time.
  • 23.  The fourth and final responsibility of the kernal is to provide recovery after a failure  A power fail interrupt which has the second-highest priority notifies the operating system whenever a power loss is detected.  The power notify object provides a way for a device driver to register a routine that is call on power restoration and ensures that devices get set to the proper and recovery
  • 24.  Object manager  Virtual- Memory Manager  process manager  Local-procedure-call facility  I/O manager  Security reference monitor  Plug-and-play manager
  • 25. MS-DOS subsystem 16-bit Windows Environment  Win32 Environment  POSIX subsystem  OS/2 subsystem  Logon and security subsystem
  • 26. • Internal layout • Recovery • Security • Volume Management andFault Tolerance • Compression • Reparse Points
  • 27.  Windows 2000 supports both peer-to-peer and client server networking. The networking components provide data transport, interprocess communication file sharing across a network, and the ability to send print jobs to remote printers.  Protocols  Distributed processing Mechanisms