Osy Ch. 02
Osy Ch. 02
• Process management
• Main memory management
• File management
• I/O system management
• Secondary storage management
1.Process Management:
• A program is a set of instructions. When CPU is allocated to a
program, it can start its execution. A program in execution is a
process.
• E.g. A word processing program run by a user on a PC is a process.
• The operating system responsible for the following activities in
connection with process management:
• Creation and deletion of user and system processes.
• Suspension and resumption of processes.
• A mechanism for process synchronization.
• A mechanism for process communication.
• A mechanism for deadlock handling.
Main Memory Management
• Main memory is a large array of words or bytes, ranging in size from
hundreds of thousands to billions.
• Main memory is a repository of quickly accessible data shared by the
CPU and I/O devices.
• The central processor reads instructions from main memory during the
instruction fetch cycle and both reads and writes data from main
memory during the data fetch cycle.
• The operating system responsible for the following activities in
connection with main memory s management:
• Keeping track of which parts of memory are currently being used and by whom.
• Deciding which processes (or parts thereof) and data to move into and out of
memory.
• Allocating and deallocating memory space as needed.
File Management
• A file is a collected of related information defined by its creator. Computer can
store files on the disk (secondary storage), which provide long term storage.
• Some examples of storage media are magnetic tape, magnetic disk and optical
disk.
• Each of these media has its own properties like speed, capacity, and data transfer
rate and access methods.
• A file system normally organized into directories to ease their use. These
directories may contain files and other directions.
• The operating system responsible for the following activities in connection with
file management:
• The creation and deletion of files.
• The creation and deletion of directions.
• The support of primitives for manipulating files and directions.
• The mapping of files onto secondary storage.
• The backup of files on stable storage media.
I/O Device Management
• Input / Output device management provides an environment for the
better interaction between system and the I / O devices (such as
printers, scanners, tape drives etc.).
• To interact with I/O devices in an effective manner, the operating
system uses some special programs known as device driver.
• The device drivers take the data that operating system has defined as
a file and then translate them into streams of bits or a series of laser
pulses (in regard with laser printer).
• The I/O subsystem consists of several components:
• A memory management component that includes buffering, caching, spooling
• A general device driver interface
• Drivers for specific hardware devices
Secondary Storage Management
• Secondary storage consists of tapes drives, disk drives, and other media
• The computer system provides secondary storage to back up main memory.
• Secondary storage is required because main memory is too small to
accommodate all data and programs, and the data that it holds is lost when
power is lost.
• Most of the programs including compilers, assemblers, word processors,
editors, and formatters are stored on a disk until loaded into memory.
• The operating system is responsible for the following activities in
connection with disk management:
• Free space management
• Storage allocation
• Disk scheduling.
Operating System Tools
• User Management
• Security Policy
• Device Management
• Performance monitor
• Task Scheduler
User Management
• User management describes the ability for administrators to manage
user access to various IT resources like
systems,devices,applications,storage systems,networks and more
• User management is a core part to any directory service and is a basic
security essential for any organization
• User Management enables admins to control user access and on-
board and off-board users to and from IT resources
• There are 3 types of accounts in UNIX OS:
1.Root:this account belongs to system administrator(Super user)
2.System Accounts:Related to system components(Mail)
3.User Accounts:Belongs to users and group of users.They have
limited access to system files and directories
Security Policy
• This option allows the administrator to provide access or deny access
to some users to some drive or software on those drives.
• Thus the changes in those software or drives will not be possible for
them, whom the access to change or configure is not given by the
administrator.
• E.g.By this end user policy one administrator can allow or disallow any
user on those computers to get an access over few websites or not.
By these the users can also be restricted to surf freely at their work
place as most of the irrelevant website; basically the irrelevant
websites to the job will not be opened from there.
Device Management