CH 1 (Introduction)
CH 1 (Introduction)
Introduction
References:
1. Abraham Silberschatz, Greg Gagne, and Peter Baer Galvin, "Operating System
Concepts, Ninth Edition ", Chapter 1
operating systems can be explored from two viewpoints: that of the user and that of the system.
1. User View
Ease of use
good performance
Reliability
Don’t care about resource utilization
2. System View
OS works as a resource allocator
OS works as a control program
1. User Mode
2. Kernel Mode / Monitor Mode / Supervised Mode
A bit, called the Mode Bit is added to the hardware of the computer to indicate the current mode: kernel mode
(0) or user mode (1). With the mode bit we are able to distinguish between a task that is executed on behalf of
the operating system and one that is executed on behalf of the user.
1. Process management
2. Memory management
3. Job scheduling
4. Resource allocation strategies
5. Swap space / virtual memory in physical memory
6. Interrupt handling
3
1. Process Management
2. Memory Management
Keeping track of which blocks of memory are currently in use, and by which processes.
Determining which blocks of code and data to move into and out of memory, and when.
Allocating and deallocating memory as needed. ( E.g. new, malloc )
3. Job scheduling
FCFS
Shortest Job First
Round Robin
Priority Scheduling
Protection involves ensuring that no process access or interfere with resources to which they are
not entitled, either by design or by accident. ( E.g. "protection faults" when pointer variables are
misused. )
Security involves protecting the system from deliberate attacks, either from legitimate users of
the system attempting to gain unauthorized access and privileges, or external attackers attempting
to access or damage the system.