Ilovepdf Merged
Ilovepdf Merged
Ilovepdf Merged
APPLICATIONS
IT 11
PRELIMS
❖ O p er a t i ng Sys t e ms O v e r v i e w
❖ Pr o ces s Ma n age me n t
❖ Memo r y Ma n ag e me nt
❖ St o r a g e Ma n age me nt
❖ Pr o t ect i o n & S e c ur i t y
VISION
The leading University in human resource development, knowledge
and technology generation and environmental stewardship
MISSION
The University of Rizal System is committed to nurture and produce
upright and competent graduates and empowered community
through relevant and sustainable higher professional and technical
instruction, research, extension and production services.
GOALS CORE VALUES
Quality and Excellence
Relevance and R – Responsiveness
Responsiveness I – Integrity
Access and Equity S – Service
Efficiency and Effectiveness E – Excellence
S – Social Responsibility
College Goals
College of Computer Studies commits itself in the pursuit of excellence, provides Information Technology methodologies in the
advancement of students’ innovativeness, creativity, and competencies as they foster their values in the service of men.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Operating System Overview
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Operating System Overview
To understand more fully the operating system’s role, we next explore operating systems from two
viewpoints: that of the user and that of the system.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Operating System Overview
• User View
• The user’s view of the computer varies according to the interface being used. Many
computer users sit with a laptop or in front of a PC consisting of a monitor, keyboard, and
mouse. Such a system is designed for one user to monopolize its resources. The goal is to
maximize the work (or play) that the user is performing. In this case, the operating system is
designed mostly for ease of use, with some attention paid to performance and security and
none paid to resource utilization how various hardware and software resources are shared.
• Increasingly, many users interact with mobile devices such as smartphones and tablet
devices that are replacing desktop and laptop computer systems for some users.
• The user interface for mobile computers generally features a touch screen, where the user interacts
with the system by pressing and swiping fingers across the screen rather than using a physical keyboard
and mouse.
• Many mobile devices also allow users to interact through a voice recognition interface, such as Apple’s
Siri.
• Some computers have little or no user view. For example, embedded computers in home devices and
automobiles may have numeric keypads and may turn indicator lights on or off to show status, but they
and their operating systems and applications are designed primarily to run without user intervention.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Operating System Overview
• System View
• From the computer’s point of view, the operating system is the program most
intimately involved with the hardware. In this context, we can view an operating
system as a resource allocator. A computer system has many resources that may be
required to solve a problem: CPU time, memory space, storage space, I/O devices,
and so on. The operating system acts as the manager of these resources. Facing
numerous and possibly conflicting requests for resources, the operating system
must decide how to allocate them to specific programs and users so that it can
operate the computer system efficiently and fairly. A slightly different view of an
operating system emphasizes the need to control the various I/O devices and user
programs. An operating system is a control program. A control program manages
the execution of user programs to prevent errors and improper use of the computer.
It is especially concerned with the operation and control of I/O devices.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Operating System Overview
• Multiprocessor Systems
• Multiprocessors systems are growing in use and importance. Also known as parallel systems,
tightly-coupled systems
• Advantages include:
• Increased throughput
• Economy of scale
• Increased reliability – graceful degradation or fault tolerance
• Two types:
• The most common multiprocessor systems use symmetric multiprocessing (SMP), in which each
peer CPU processor performs all tasks, including operating-system functions and user processes.
• multiprocessor has evolved over time and now includes multicore systems, in which multiple
computing cores reside on a single chip. Multicore systems can be more efficient than multiple
chips with single cores.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Operating System Overview
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Operating System Overview
• Clustered System
• Like multiprocessor systems, but multiple systems
working together
• Usually sharing storage via a storage-area network
(SAN)
• Provides a high-availability service which survives
failures
• Asymmetric clustering has one machine in hot-standby
mode
• Symmetric clustering has multiple nodes running
applications, monitoring each other
• Some clusters are for high-performance computing
(HPC)
• Applications must be written to use parallelization
• Some have distributed lock manager (DLM) to avoid
conflicting operations
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Operating System Overview
• Mobile OS
• A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and
other devices to run applications and programs. A mobile OS typically starts up when a device powers on,
presenting a screen with icons or tiles that present information and provide application access. Mobile
operating systems also manage cellular and wireless network connectivity, as well as phone access.
https://www.youtube.com/watch?v=rMTDVK0Zb2k
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• What is a Process?
• Process is the execution of a program that performs the actions specified in that program. It can be
defined as an execution unit where a program runs. The OS helps you to create, schedule, and
terminates the processes which is used by CPU. A process created by the main process is called a
child process.
• Process operations can be easily controlled with the help of PCB(Process Control Block). You can
consider it as the brain of the process, which contains all the crucial information related to
processing like process id, priority, state, CPU registers, etc.
• Here are the important properties of the process:
• Creation of each process requires separate system calls for each process.
• It is an isolated execution entity and does not share data and information.
• Processes use the IPC(Inter-Process Communication) mechanism for communication that
significantly increases the number of system calls.
• Process management takes more system calls.
• A process has its stack, heap memory with memory, and data map.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Heap: Allocates memory, which may be processed during its run time.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• What is Thread?
• Thread is an execution unit that is part of a process. A process can have multiple threads, all executing at the
same time. It is a unit of execution in concurrent programming. A thread is lightweight and can be managed
independently by a scheduler. It helps you to improve the application performance using parallelism.
• Multiple threads share information like data, code, files, etc. We can implement
threads in three different ways:
• Kernel-level threads
• User-level threads
• Hybrid threads
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Process Synchronization
• It is the task phenomenon of coordinating the execution of processes in such a way that no two
processes can have access to the same shared data and resources.
• It is a procedure that is involved in order to preserve the appropriate order of execution of cooperative
processes.
• In order to synchronize the processes, there are various synchronization mechanisms.
• Process Synchronization is mainly needed in a multi-process system when multiple processes are
running together, and more than one processes try to gain access to the same shared resource or any
data at the same time.
• Process Synchronization was introduced to handle problems that arose while multiple
process executions. Process is categorized into two types on the basis of synchronization
and these are given below:
• Independent Process
• Two processes are said to be independent if the execution of one process does not affect the execution of another process.
• Cooperative Process
• Two processes are said to be cooperative if the execution of one process affects the execution of another process. These
processes need to be synchronized so that the order of execution can be guaranteed.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Race Condition
• At the time when more than one process is either executing the same code or
accessing the same memory or any shared variable; In that condition, there is a
possibility that the output or the value of the shared variable is wrong so for that
purpose all the processes are doing the race to say that my output is correct. This
condition is commonly known as a race condition. As several processes access and
process the manipulations on the same data in a concurrent manner and due to
which the outcome depends on the particular order in which the access of data
takes place.
• Mainly this condition is a situation that may occur inside the critical section. Race
condition in the critical section happens when the result of multiple thread
execution differs according to the order in which the threads execute. But this
condition is critical sections can be avoided if the critical section is treated as an
atomic instruction. Proper thread synchronization using locks or atomic variables
can also prevent race conditions.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Critical Section Problem
• Critical section is a code segment that can be accessed by only one process at a time. Critical section contains
shared variables which need to be synchronized to maintain consistency of data variables. It means that in a
group of cooperating processes, at a given point of time, only one process must be executing its critical section.
If any other process also wants to execute its critical section, it must wait until the first one finishes. The entry to
the critical section is mainly handled by wait() function while the exit from the critical section is controlled by
the signal() function.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Solutions for the Critical Section. Some widely used method to solve the critical
section problem are as follows:
• Peterson's Solution
• This is widely used and software-based solution to critical section problems. Peterson's solution was
developed by a computer scientist Peterson that's why it is named so.
• With the help of this solution whenever a process is executing in any critical state, then the other process only
executes the rest of the code, and vice-versa can happen. This method also helps to make sure of the thing
that only a single process can run in the critical section at a specific time.
• Semaphores
• A semaphore is a signaling mechanism and a thread that is waiting on a semaphore can be signaled by
another thread. This is different than a mutex as the mutex can be signaled only by the thread that called the
wait function.
• A semaphore uses two atomic operations, wait and signal for process synchronization. A Semaphore is an
integer variable, which can be accessed only through two operations wait() and signal().There are two types
of semaphores: Binary Semaphores and Counting Semaphores
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Synchronization Hardware
• Many systems provide hardware support for critical section code. The critical section problem could be solved
easily in a single-processor environment if we could disallow interrupts to occur while a shared variable or
resource is being modified.
• In this manner, we could be sure that the current sequence of instructions would be allowed to execute in
order without pre-emption. Unfortunately, this solution is not feasible in a multiprocessor environment.
• Disabling interrupt on a multiprocessor environment can be time-consuming as the message is passed to all
the processors.
• This message transmission lag delays the entry of threads into the critical section, and the system efficiency
decreases.
• Mutex Locks
• As the synchronization hardware solution is not easy to implement for everyone, a strict software approach
called Mutex Locks was introduced. In this approach, in the entry section of code, a LOCK is acquired over the
critical resources modified and used inside the critical section, and in the exit section that LOCK is released.
• As the resource is locked while a process executes its critical section hence no other process can access it.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Preemptive Scheduling
• In Preemptive Scheduling, the tasks are mostly assigned with their
priorities. Sometimes it is important to run a task with a higher priority
before another lower priority task, even if the lower priority task is still
running. The lower priority task holds for some time and resumes when
the higher priority task finishes its execution.
• Non-Preemptive Scheduling
• In this type of scheduling method, the CPU has been allocated to a
specific process. The process that keeps the CPU busy will release the CPU
either by switching context or terminating. It is the only method that can
be used for various hardware platforms. That's because it doesn't need
special hardware (for example, a timer) like preemptive scheduling.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Minimize:
• Waiting time: Waiting time is an amount that specific process needs to wait in the ready queue.
• Response time: It is an amount to time in which the request was submitted until the first response is
produced.
• Turnaround Time: Turnaround time is an amount of time to execute a specific process. It is the calculation of
the total time spent waiting to get into the memory, waiting in the queue and, executing on the CPU. The
period between the time of process submission to the completion time is the turnaround time.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Types of CPU scheduling Algorithm: There are mainly six types of process
scheduling algorithms
• First Come First Serve (FCFS)
• Shortest-Job-First (SJF) Scheduling
• Shortest Remaining Time
• Priority Scheduling
• Round Robin Scheduling
• Multilevel Queue Scheduling
https://youtube.com/playlist?list=PLpRG0HEiKEz7bCDd0ew3k1F-BrSdN1hBH
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• Round-Robin Scheduling
• Round robin is the oldest, simplest scheduling algorithm. The name of this algorithm comes from the
round-robin principle, where each person gets an equal share of something in turn. It is mostly used for
scheduling algorithms in multitasking. This algorithm method helps for starvation free execution of
processes.
• Characteristics of Round-Robin Scheduling
• Round robin is a hybrid model which is clock-driven
• Time slice should be minimum, which is assigned for a specific task to be processed. However, it may vary for
different processes.
• It is a real time system which responds to the event within a specific time limit.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Process Management
• What is Deadlock?
• Deadlock is a situation that occurs in OS when any process enters a waiting state because another waiting process is
holding the demanded resource. Deadlock is a common problem in multi-processing where several processes share
a specific type of mutually exclusive resource known as a soft lock or software.
• Advantages of Deadlock
• This situation works well for processes which perform a single burst of activity
• No preemption needed for Deadlock.
• Convenient method when applied to resources whose state can be saved and restored easily
• Feasible to enforce via compile-time checks
• Needs no run-time computation since the problem is solved in system design
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Memory Management
• Main memory refers to physical memory that is internal to the computer. The word
main is used to distinguish it from external mass storage devices such as disk drives.
Other terms used to mean main memory include RAM and primary storage. The
computer can manipulate only data that is in main memory. Therefore, every
program you execute and every file you access must be copied from a storage
device into main memory. The amount of main memory on a computer is crucial
because it determines how many programs can be executed at one time and how
much data can be readily available to a program.
• Virtual memory is stored on the hard drive. Virtual memory is used when the RAM
is filled. Virtual memory is slower than physical memory, so it can decrease the
performance of applications. Virtual memory abstracts physical memory into an
extremely large uniform array of storage. Virtual memory enables a system to run
larger applications or run more applications at the same time without running out of
RAM. Specifically, the system can operate as if its total RAM resources were equal
to the amount of physical RAM, plus the amount of virtual RAM.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Memory Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Memory Management
• Memory Management Techniques
• Single Contiguous Allocation
• It is the easiest memory management technique. In this method, all types of computer's memory except a small portion
which is reserved for the OS is available for one application. For example, MS-DOS operating system allocates memory in
this way. An embedded system also runs on a single application.
• Partitioned Allocation
• It divides primary memory into various memory partitions, which is mostly contiguous areas of memory. Every partition
stores all the information for a specific task or job. This method consists of allotting a partition to a job when it starts &
unallocated when it ends.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Memory Management
• What is Swapping?
• Swapping is a method in which the process should be swapped temporarily from the main memory to the
backing store. It will be later brought back into the memory for continue execution.
• Backing store is a hard disk or some other secondary storage device that should be big enough inorder to
accommodate copies of all memory images for all users. It is also capable of offering direct access to these
memory images.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Memory Management
• Partition Allocation
• Memory is divided into different blocks or partitions. Each process is allocated according to the
requirement. Partition allocation is an ideal method to avoid internal fragmentation.
• Below are the various partition allocation schemes :
• First Fit: In this type fit, the partition is allocated, which is the first sufficient block from the beginning of the
main memory.
• Best Fit: It allocates the process to the partition that is the first smallest partition among the free partitions.
• Worst Fit: It allocates the process to the partition, which is the largest sufficient freely available partition in
the main memory.
https://www.youtube.com/watch?v=Xf4Ipw_MY5I
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Memory Management
• What is Paging?
• Paging is a storage mechanism that allows OS to retrieve processes from the secondary storage
into the main memory in the form of pages. In the Paging method, the main memory is divided
into small fixed-size blocks of physical memory, which is called frames. The size of a frame should
be kept the same as that of a page to have maximum utilization of the main memory and to avoid
external fragmentation. Paging is used for faster access to data, and it is a logical concept.
• What is Segmentation?
• Segmentation method works almost similarly to paging. The only difference between the two is
that segments are of variable-length, whereas, in the paging method, pages are always of fixed
size.
• A program segment includes the program's main function, data structures, utility functions, etc.
The OS maintains a segment map table for all the processes. It also includes a list of free memory
blocks along with its size, segment numbers, and its memory locations in the main memory or
virtual memory.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Memory Management
• What is Fragmentation?
• Processes are stored and removed from memory, which creates free memory space, which are too
small to use by other processes.
• After sometimes, that processes not able to allocate to memory blocks because its small size and
memory blocks always remain unused is called fragmentation. This type of problem happens during
a dynamic memory allocation system when free blocks are quite small, so it is not able to fulfill any
request.
• Two types of Fragmentation methods are:
• External fragmentation
• External fragmentation can be reduced by rearranging memory contents to place all free memory together in a single
block.
• Internal fragmentation
• The internal fragmentation can be reduced by assigning the smallest partition, which is still good enough to carry the
entire process.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Memory Management
Compaction is a process in which the free space is collected in a large memory chunk to
make some space available for processes. In memory management, swapping creates
multiple fragments in the memory because of the processes moving in and out.
Compaction refers to combining all the empty spaces together and processes.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
• Storage management plays an important part in operating system. It deals with the storage
procedures in the computer system using an operating system.
• Storage Management is defined as it refers to the management of the data storage
equipment’s that are used to store the user/computer generated data. Hence it is a tool or
set of processes used by an administrator to keep your data and storage equipment’s safe.
• Storage management is a process for users to optimize the use of storage devices and to
protect the integrity of data for any media on which it resides and the category of storage
management generally contain the different type of subcategories covering aspects such as
security, virtualization and more, as well as different types of provisioning or automation,
which is generally made up the entire storage management software market.
• Storage management key attributes:
• Performance
• Reliability
• Recoverability
• Capacity
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
• Hard Disk Drives
• Conceptually, HDDs are relatively simple (Figure 11.1). Each disk platter has a flat circular shape, like a CD. Common
platter diameters range from 1.8 to 3.5 inches. The two surfaces of a platter are covered with a magnetic material. We
store information by recording it magnetically on the platters, and we read information by detecting the magnetic
pattern on the platters.
• Platters range from .85” to 14” (historically)
• Commonly 3.5”, 2.5”, and 1.8”
• Seek time from 3ms to 12ms – 9ms common for desktop drives
• Average seek time measured or calculated based on 1/3 of tracks
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
• File System
• A file is a collection of related information defined by its creator. Files are mapped
by the operating system onto physical mass-storage devices. A file system describes
how files are mapped onto physical devices, as well as how they are accessed and
manipulated by both users and programs.
• Accessing physical storage can often be slow, so file systems must be designed for
efficient access. Other requirements may be important as well, including providing
support for file sharing and remote access to files.
• file system is the most visible aspect of a general-purpose operating system. It
provides the mechanism for on-line storage of and access to both data and
programs of the operating system and all the users of the computer system. The file
system consists of two distinct parts: a collection of files, each storing related data,
and a directory structure, which organizes and provides information about all the
files in the system. Most file systems live on storage devices.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
• File Attributes
• Name – only information kept in human-readable form
• Identifier – unique tag (number) identifies file within file system
• Type – needed for systems that support different types
• Location – pointer to file location on device
• Size – current file size
• Protection – controls who can do reading, writing, executing
• Time, date, and user identification – data for protection, security, and usage
monitoring
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
• File Types
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
• File System Structure
• I/O Control level
• Device drivers acts as interface between devices and Os, they help to transfer data
between disk and main memory. It takes block number a input and as output it gives
low level hardware specific instruction.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
• I / O System
• Management of I/O devices is a very important part of the operating system - so
important and so varied that entire I/O subsystems are devoted to its operation. (
Consider the range of devices on a modern computer, from mice, keyboards, disk
drives, display adapters, USB devices, network connections, audio I/O, printers,
special devices for the handicapped, and many special-purpose peripherals. )
• I/O Subsystems must contend with two ( conflicting? ) trends: (1) The gravitation
towards standard interfaces for a wide range of devices, making it easier to add
newly developed devices to existing systems, and (2) the development of entirely
new types of devices, for which the existing standard interfaces are not always easy
to apply.
• Device drivers are modules that can be plugged into an OS to handle a particular
device or category of similar devices.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
• I / O Hardware
• I/O devices can be roughly categorized as storage, communications, user-interface,
and other
• Devices communicate with the computer via signals sent over wires or through the
air.
• Devices connect with the computer via ports, e.g. a serial or parallel port.
• A common set of wires connecting multiple devices is termed a bus.
• Buses include rigid protocols for the types of messages that can be sent across the
bus and the procedures for resolving contention issues.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
• Interrupt:
• Interrupt is a hardware mechanism in which, the device notices the CPU that it
requires its attention. Interrupt can take place at any time. So when CPU gets an
interrupt signal trough the indication interrupt-request line, CPU stops the current
process and respond to the interrupt by passing the control to interrupt handler
which services device.
• Polling:
• In polling is not a hardware mechanism, its a protocol in which CPU steadily
checks whether the device needs attention. Wherever device tells process unit
that it desires hardware processing, in polling process unit keeps asking the I/O
device whether or not it desires CPU processing. The CPU ceaselessly check every
and each device hooked up thereto for sleuthing whether or not any device
desires hardware attention.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Storage Management
https://www.youtube.com/watch?v=f7LLKL1g-kk IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Protection and Security
• Security ensures the authentication of system users to protect the integrity of the
information stored in the system (both data and code), as well as the physical resources of
the computer system. The security system prevents unauthorized access, malicious
destruction or alteration of data, and accidental introduction of inconsistency.
• Protection is the set of mechanisms that control the access of processes and users to the
resources defined by a computer system. It controls access to a system by limiting the types
of file access permitted to users. In addition, protection must ensure that only processes
that have gained proper authorization from the operating system can operate on memory
segments, the CPU, and other resources. Protection is provided by a mechanism that
controls the access of programs, processes, or users to the resources defined by a computer
system. This mechanism must provide a means for specifying the controls to be imposed,
together with a means of enforcing them.
• Protection and security requires that computer resources such as CPU, software, memory
etc. are protected. This extends to the operating system as well as the data in the system.
This can be done by ensuring integrity, confidentiality and availability in the operating
system. The system must be protect against unauthorized access, viruses, worms etc.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Protection and Security
Threats to Protection and Security
• Virus
• Viruses are generally small snippets of code embedded in a system. They are very dangerous and can corrupt files, destroy data,
crash systems etc. They can also spread further by replicating themselves as required.
• Trojan Horse
• A trojan horse can secretly access the login details of a system. Then a malicious user can use these to enter the system as a
harmless being and wreak havoc.
• Trap Door
• A trap door is a security breach that may be present in a system without the knowledge of the users. It can be exploited to harm the
data or files in a system by malicious people.
• Worm
• A worm can destroy a system by using its resources to extreme levels. It can generate multiple copies which claim all the resources
and don't allow any other processes to access them. A worm can shut down a whole network in this way.
• Denial of Service
• These type of attacks do not allow the legitimate users to access a system. It overwhelms the system with requests so it is
overwhelmed and cannot work properly for other user.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Protection and Security
• Authentication
• This deals with identifying each user in the system and making sure they are who they claim to be.
The operating system makes sure that all the users are authenticated before they access the
system. The different ways to make sure that the users are authentic are:
• Username/ Password
• Each user has a distinct username and password combination and they need to enter it correctly
before they can access the system.
• User Key/ User Card
• The users need to punch a card into the card slot or use they individual key on a keypad to access the
system.
• User Attribute Identification
• Different user attribute identifications that can be used are fingerprint, eye retina etc. These are
unique for each user and are compared with the existing samples in the database. The user can only
access the system if there is a match.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Protection and Security
• Random Numbers
• The system can ask for numbers that correspond to alphabets that are pre arranged. This
combination can be changed each time a login is required.
• Secret Key
• A hardware device can create a secret key related to the user id for login. This
key can change each time.
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Protection and Security
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Protection and Security
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Protection and Security
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
Protection and Security
IT 11 – Operating System Applications _ AY 1st Sem 21-22: BIENDO R. DELOS ANGELES III
20 kb 40 kb 60 kb 50 kb 30 kb 25 kb
First Fit
20 kb 40 kb 60 kb 50 kb 30 kb 25 kb
20 kb 40 kb 60 kb 50 kb 30 kb 25 kb
5 6
k k
b 32 kb b
5 6
k 32 kb k 20 kb 30 kb 25 kb
b b INTERNAL EXTERNAL
p1 p2 p3 75 kb
Worst Fit
20 kb 40 kb 60 kb 50 kb 30 kb 25 kb
20 kb 40 kb 60 kb 50 kb 30 kb 25 kb
25 kb 22 kb
20 kb 40 kb 30 kb 25 kb
25 kb 22 kb
P1 P2 115 kb
Best Fit
20 kb 40 kb 60 kb 50 kb 30 kb 25 kb
5 6 2
11
20 kb 40 kb k 60 kb kb
50 kb k 30 kb k 25 kb
b b b
5 62
11
k kb k k 20 kb 25 kb
b bb
P1 P4 P3 P2 45 kb