Posts

Showing posts from August, 2023

Concept Map Operating Systems Theory and Design CPT 304

Image
 

Features of the contemporary operating system (OS) and their structures

Image
  One of the main features of a current OS is to provide the user with an environment where they can execute programs on a platform that is convenient to navigate on (Silberschatz 2014).   The OS is a control program that supervises the execution of a user program to prevent errors and improper use of the computer.   Furthermore, an OS also manages the operations/control of the input and output devices of the system. The OS has control of many functions and is structured in a way that maintains a fully function environment for that particular user or many users.  Some of the major functions of the OS are a graphical user interface (GUI), processor management, memory management, device management, job accounting, network management, and file management just to name a few.

How do operating systems enable processes to share and exchange information?

Image
  The OS provides mechanisms for applications to communicate with each other and this is called inter-process communication (Singh 2022).   Data can be shared, and activities can be coordinated through scheduling and resource allocation.   Memory, processor, device, and file management are critical roles that allow for processes to properly share and exchange information without interrupting or crashing applications.

How do main memory and virtual memory solve memory management issues?

  Memory management algorithms vary from very basic to paging and segmentation strategies.   Modern computer systems operations depend on memory management to function correctly.   Memory space utilization uses dynamic loading to obtain better memory management, this is when a routine is not loaded until it is called.   Main memory also uses swapping, memory protection, memory allocation, segmentation, and paging to solve memory management issues. •       Swapping – a process can be swapped out of memory and put back in storage and then brought back which allows for processes to exceed the real physical address space of the memory in the system. •       Memory Protection – to prevent a process from accessing memory that it does not own •       Can use limit register together with a relocation register to prevent unauthorized access. •       Allocating memory – ...

How are files, mass storage, and I/O handled in a modern OS?

Image
  The OS controls file management and is organized into directories for efficient or easy navigation/usage.   A visual representation of this is: Some modern types of mass storage are: ·          - Solid-state disks (SSD), Hard disks ·          - Internal/External hard drives ·          - Optical/tape/RAID/USB drives ·          - Magnetic Tapes Modern hard disk drives are addressed as a large one-dimensional array of logical blocks, where the logical block is the smallest unit of transfer (Silberschatz 2014).   The one-dimensional array of logical blocks is mapped onto the sectors of the disk sequentially.   The mapping proceeds in order through that track, then though the rest of the tracks in that cylinder. Input/Output devices such as a keyboard, mouse, printer, touchscreen, and printer are a major part of the main functions of an OS.  Device drivers ...

Outline the mechanisms necessary to control the access of programs or users to the resources defined by the computer system.

Image
  An OS can have multiple users or a single user that will be executing processes and these must be protected from each other’s processes.   An access matrix is used to control the access of programs and can implement policy decisions concerning protection.   The access matrix also provides an appropriate mechanism for defining and implementing strict control for both static and dynamic association between process and domains. There is also domain and language-based protection in modern OS.  Domain-based protection only allows processes to access resources it has authorization for using need-to-know principle.  Language-based protection originates in the programming language and pertains heavily on abstract data types and objects. As you can see from the figure above there are other security mechanisms needed to insure authorized access to a computer system. •       Authentication/Authorization – System must authenticate user. • ...

Recommend how you will use these concepts about operating systems theory in future courses and/or future jobs.

  I am currently working on my IT degree and these concepts/theories of an Operating System can translate into other cognitive problem-solving techniques with other courses such as computer networks, databases, algorithms, data structures and many other coursers since these are interlinked with the functions of an OS.   As for future jobs, knowing how an OS functions will help me be able to be flexible learning other OS’ such as Linux and different versions of Windows. References: •       Kulhary, R.   (April 2023).   Critical Section in Synchronization.   Geek for Geeks. https://www.geeksforgeeks.org/g-fact-70/ •       Operating System Structure, javaTpoint.   https://www.javatpoint.com/operating-system-structure •       Silberschatz, A., Galvin, P. B., & Gagne, G. (2014).  Operating system concepts essentials  (2nd ed.). Retrieved from https://redshelf.com/ • ...