Module 2 - Week 3 - Platform Technologies PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Elective 1 – Platform Technologies

1. Title of the Module


Chapter 3: Introduction to Operating System

2. Introduction
This lesson presents the Operating System. An Operating System (OS)
acts as an intermediary between the user of a computer and computer hardware.
The purpose of an operating system is to provide an environment in which a user
can execute programs in a convenient and efficient manner. An operating system is
a software which performs all the basic tasks like file management, memory
management, process management, handling input and output, and controlling
peripheral devices such as disk drives and printers. Some popular Operating
Systems include Linux Operating System, Windows Operating System, VMS, OS/
400, AIX, z/OS, etc. Assessment tasks will be submitted on or before the scheduled
date as specified in the Course Guide.

3. Learning Outcome
After completing this module, the students should acquire the following
learning competencies:

➢ Define and explain operating system


➢ Identify important function of operating system
➢ Discuss and distinguish different types of operating system

ISUE–CCSICT –IM-092 - Instruction Material Page 1


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
4. Learning Content
Topics for Module 1: Introduction to Operating Systems

Topic 1: Introduction – What is Operating System?


An operating system is a program designed to run other programs on a computer.
A computer’s operating system is its most important program. It is considered the
backbone of a computer, managing both software and hardware resources. Operating
systems are responsible for everything from the control and allocation of memory to
recognizing input from external devices and transmitting output to computer displays.
They also manage files on computer hard drives and control peripherals, like printers and
scanners.

Figure 1: Operating System Interfaces

Operating system (OS) is also referred as the intermediary between the computer
and the user. Instructions and request come from user through a peripheral or device will
be received first by the operating system then translated into a set of instruction that a

ISUE–CCSICT –IM-092 - Instruction Material Page 2


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
computer can understand and when the computer replies, it is also gathered by the OS
then translated for the user.

Operating system goals:


• Execute user programs and make solving user problems easier
• Make the computer system convenient to use
• Use the computer hardware in an efficient manner

Computer System Structure


Computer system can be divided into four components

Figure 2. Computer System Structure

Hardware – provides basic computing resources CPU, memory, I/O devices


Operating system-Controls and coordinates use of hardware among various
applications and users
Application programs – define the ways in which the system resources are used
to solve the computing problems of the users.
- Word processors, compilers, web browsers, database systems, video
games

Users – People, machines, other computers


ISUE–CCSICT –IM-092 - Instruction Material Page 3
ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
Operating System Functions
At the simplest level, an operating system does four things:
1. It manages the hardware and software resources of the system. In a desktop
computer, these resources include such things as the processor, memory, disk
space and more (On a cell phone, they include the keypad, the screen, the
address book, the phone dialer, the battery and the network connection).
2. It provides a stable and consistent way for applications to deal with the
hardware without having to know all the details of the hardware.
3. System tools (programs) used to monitor computer performance, debug
problems, or maintain parts of the system.
4. A set of libraries or functions which programs may use to perform specific tasks
especially relating to interfacing with computer system components.

Topic 2: Types of Operating Systems


Operating systems are there from the very first computer generation and they keep
evolving with time. In this chapter, we will discuss some of the important types of
operating systems which are most commonly used.

ISUE–CCSICT –IM-092 - Instruction Material Page 4


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
1. Batch operating system

The users of a batch operating system do not interact with the computer
directly. Each user prepares his job on an off-line device like punch cards and submits
it to the computer operator. To speed up processing, jobs with similar needs are
batched together and run as a group. The programmers leave their programs with the
operator and the operator then sorts the programs with similar requirements into
batches.

The problems with Batch Systems are as follows − • Lack of interaction between
the user and the job.

- CPU is often idle, because the speed of the mechanical I/O devices is
slower than the CPU.

- Difficult to provide the desired priority.

2. Time-sharing operating systems

Time-sharing is a technique which enables many people, located at various


terminals, to use a particular computer system at the same time. Timesharing or
multitasking is a logical extension of multiprogramming. Processor's time which is
shared among multiple users simultaneously is termed as timesharing.

The main difference between Multiprogrammed Batch Systems and


TimeSharing Systems is that in case of Multiprogrammed batch systems, the objective
is to maximize processor use, whereas in Time-Sharing Systems, the objective is to
minimize response time.

The operating system uses CPU scheduling and multiprogramming to provide


each user with a small portion of a time. Computer systems that were designed
primarily as batch systems have been modified to time-sharing systems.

Advantages of Timesharing operating systems are as follows −

• Provides the advantage of quick response.

ISUE–CCSICT –IM-092 - Instruction Material Page 5


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
• Avoids duplication of software.

• Reduces CPU idle time.

Disadvantages of Time-sharing operating systems are as follows −

• Problem of reliability.

• Question of security and integrity of user programs and data.

• Problem of data communication.

3. Distributed operating System

Distributed systems use multiple central processors to serve multiple realtime


applications and multiple users. Data processing jobs are distributed among the
processors accordingly.

The processors communicate with one another through various communication


lines (such as high-speed buses or telephone lines). These are referred as loosely
coupled systems or distributed systems. Processors in a distributed system may vary
in size and function. These processors are referred as sites, nodes, computers, and
so on.

The advantages of distributed systems are as follows −

• With resource sharing facility, a user at one site may be able to use the
resources available at another.
• Speedup the exchange of data with one another via electronic mail.

• If one site fails in a distributed system, the remaining sites can potentially
continue operating.
• Better service to the customers.

• Reduction of the load on the host computer.

• Reduction of delays in data processing.

ISUE–CCSICT –IM-092 - Instruction Material Page 6


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
4. Network operating System

A Network Operating System runs on a server and provides the server the
capability to manage data, users, groups, security, applications, and other networking
functions. The primary purpose of the network operating system is to allow shared file
and printer access among multiple computers in a network, typically a local area
network (LAN), a private network or to other networks. Examples of network operating
systems include Microsoft Windows Server 2003, Microsoft Windows Server 2008,
UNIX, Linux, Mac OS X, Novell NetWare, and BSD.

The advantages of network operating systems are as follows −

• Centralized servers are highly stable.

• Security is server managed.

• Upgrades to new technologies and hardware can be easily integrated


into the system.
• Remote access to servers is possible from different locations and types
of systems.

The disadvantages of network operating systems are as follows −


• High cost of buying and running a server.
• Dependency on a central location for most operations.

• Regular maintenance and updates are required.

ISUE–CCSICT –IM-092 - Instruction Material Page 7


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
5. Real Time operating System

A real-time system is defined as a data processing system in which the time


interval required to process and respond to inputs is so small that it controls the
environment. The time taken by the system to respond to an input and display of
required updated information is termed as the response time. So in this method, the
response time is very less as compared to online processing. Real-time systems are
used when there are rigid time requirements on the operation of a processor or the
flow of data and real-time systems can be used as a control device in a dedicated
application. A real-time operating system must have well-defined, fixed time
constraints, otherwise the system will fail. For example, Scientific experiments,
medical imaging systems, industrial control systems, weapon systems, robots, air
traffic control systems, etc.

There are two types of real-time operating systems.

Hard real-time systems

Hard real-time systems guarantee that critical tasks complete on time.


In hard real-time systems, secondary storage is limited or missing and the data
is stored in ROM. In these systems, virtual memory is almost never found.

Soft real-time systems

Soft real-time systems are less restrictive. A critical real-time task gets
priority over other tasks and retains the priority until it completes. Soft real-time
systems have limited utility than hard real-time systems. For example,
multimedia, virtual reality, Advanced Scientific Projects like undersea
exploration and planetary rovers, etc.

ISUE–CCSICT –IM-092 - Instruction Material Page 8


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
Topic 3: Process Management
In multiprogramming environment, the OS decides which process gets the
processor when and for how much time. This function is called Process Scheduling. An
Operating System does the following activities for processor management −

• Keeps tracks of processor and status of process. The program responsible for this
task is known as traffic controller.
• Allocates the processor (CPU) to a process.
• De-allocates processor when a process is no longer required.
• Ensuring that each process and application receives enough of the processor's
time to function properly
• Using as many processor cycles as possible for real work

Topic 4: Memory Management


Memory management refers to management of Primary Memory or Main
Memory. Main memory is a large array of words or bytes where each word or byte has
its own address.

Main memory provides a fast storage that can be accessed directly by the CPU. For
a program to be executed, it must in the main memory. An Operating System does the
following activities for memory management −

• Keeps tracks of primary memory, i.e., what part of it are in use by whom, what part
are not in use.
• In multiprogramming, the OS decides which process will get memory when and
how much.
• Allocates the memory when a process requests it to do so.

• De-allocates the memory when a process no longer needs it or has been


terminated.

ISUE–CCSICT –IM-092 - Instruction Material Page 9


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
When an operating system manages the computer's memory, there are broad tasks
to be accomplished:

• Each process must have enough memory in which to execute, and it can neither
run into the memory space of another process nor be run into by another process.

• The different types of memory in the system must be used properly so that each
process can run most effectively.

• The first task requires the operating system to set up memory boundaries for types
of software and for individual applications.

Figure 3. Main Memory Management

Topic 5: Device Management


An operating system is a program that controls the execution of application
programs and acts as an interface between the user of a computer and the computer
hardware. A more common definition is that the operating system is the one program
running at all times on the computer (usually called the kernel), with all else being
application programs.
An operating system is concerned with the allocation of resources and services,
such as memory, processors, devices, and information. The operating system
correspondingly includes programs to manage these resources, such as a traffic
controller, a scheduler, memory management module, I/O programs, and a file system.
The path between the operating system and virtually all hardware not on the
computer's motherboard goes through a special program called a driver. Much of a

ISUE–CCSICT –IM-092 - Instruction Material Page 10


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
driver's function is to be the translator between the electrical signals of the hardware
subsystems and the high-level programming languages of the operating system and
application programs. Drivers take data that the operating system has defined as a file
and translate them into streams of bits placed in specific locations on storage devices, or
a series of laser pulses in a printer.
The following functions are used in device management.
- Sends a control code directly to a specified device driver.
- Installs a new device. The user is prompted to select the device.
- Registers the device or type of device for which a window will receive
notifications.
- Closes the specified device notification handle.

Topic 6: Security and protection

Protection and security require that computer resources such as CPU, software,
memory etc. are protected. This extends to the operating system as well as the data in
the system. This can be done by ensuring integrity, confidentiality and availability in the
operating system. The system must be protected against unauthorized access, viruses,
worms etc.

Threats to Protection and Security

A threat is a program that is malicious in nature and leads to harmful effects


for the system. Some of the common threats that occur in a system are:

Virus

Viruses are generally small snippets of code embedded in a system. They


are very dangerous and can corrupt files, destroy data, crash systems etc. They
can also spread further by replicating themselves as required.

ISUE–CCSICT –IM-092 - Instruction Material Page 11


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
Trojan Horse
A trojan horse can secretly access the login details of a system. Then a
malicious user can use these to enter the system as a harmless being and wreak
havoc.

Trap Door
A trap door is a security breach that may be present in a system without the
knowledge of the users. It can be exploited to harm the data or files in a system by
malicious people.

Worm
A worm can destroy a system by using its resources to extreme levels. It
can generate multiple copies which claim all the resources and don't allow any
other processes to access them. A worm can shut down a whole network in this
way.

Denial of Service
This type of attacks does not allow the legitimate users to access a system.
It overwhelms the system with requests so it is overwhelmed and cannot work
properly for another user.

ISUE–CCSICT –IM-092 - Instruction Material Page 12


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
Protection and Security Methods
The different methods that may provide protect and security for different
computer systems are:

Authentication
This deals with identifying each user in the system and making sure they
are who they claim to be. The operating system makes sure that all the users are
authenticated before they access the system. The different ways to make sure that
the users are authentic are:
• Username/ Password
Each user has a distinct username and password combination and they need
to enter it correctly before they can access the system.
• User Key/ User Card
The users need to punch a card into the card slot or use they individual
key on a keypad to access the system.
• User Attribute Identification
Different user attribute identifications that can be used are fingerprint,
eye retina etc. These are unique for each user and are compared with the
existing samples in the database. The user can only access the system if there
is a match.

One Time Password


These passwords provide a lot of security for authentication purposes. A
one time password can be generated exclusively for a login every time a user
wants to enter the system. It cannot be used more than once. The various ways a
one time password can be implemented are:

ISUE–CCSICT –IM-092 - Instruction Material Page 13


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
• Random Numbers
The system can ask for numbers that correspond to alphabets that are pre-
arranged. This combination can be changed each time a login is required.

• Secret Key
A hardware device can create a secret key related to the user id for
login. This key can change each time.

Topic 7: File systems Real-time and embedded systems


A File System is normally organized into directories for easy navigation and
usage. These directories may contain files and other directions.

An Operating System does the following activities for file management −


• Keeps track of information, location, uses, status etc. The collective facilities are

often known as file system.


• Decides who gets the resources.
• Allocates and De-allocates the resources.

ISUE–CCSICT –IM-092 - Instruction Material Page 14


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
5. Assessment Tasks
Assessment Task 1. Multiple Choice: Encircle the letter of the best answer
1. The layer between the hardware and the user program is
a. Application program
b. System environment
c. Operating system
d. None
2. Which is not true from the following?
a. Network Operating system use multiple central processors to serve
multiple real-time applications and multiple users.
b. Main memory provides a fast storage that can be accessed directly by
the CPU
c. the objective of Multiprogrammed batch systems is to maximize
processor use,
d. None
3. Which of the following is the advantages of network operating system?
a. Reduction of the load on the host computer.
b. Centralized servers are highly stable.
c. Reduces CPU idle time.
d. None
4. A logical extension of multiprogramming
a. Time sharing
b. Single Programming
c. Batch System
d. None
5. A real-time operating system must have well-defined, fixed time
constraints, otherwise the system will?

a. Start
b. Fail
c. Continue
d. None
6. It refers to management of Primary Memory or Main Memory
a. Processor management
b. Device management
ISUE–CCSICT –IM-092 - Instruction Material Page 15
ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
c. Memory management
d. None
7. What does an operating system consist of?
a. A set of users
b. A set of programs
c. A form of time sharing
d. None
8. Which of the following is the disadvantages of Time-sharing operating
system?

a. High cost of buying and running a server.


b. Problem of data communication
c. Lack of interaction between the user and the job.
d. None
9. This normally organized into directories for easy navigation and usage.
a. Multiprogramming
b. Process scheduling
c. File system
d. None
10. It use multiple central processors to serve multiple real-time applications
and multiple users.

a. Time-sharing operating system


b. Distributed operating system
c. Network operating system
d. Real-time operating system

Assessment Task 2. Enumeration: Enumerate the following


1. Types of operating system
2. Important function of operating system
3. Types of real-time operating system

ISUE–CCSICT –IM-092 - Instruction Material Page 16


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020
Assessment Task 3. Essay
1. Explain the main purpose of operating system?
2. Elaborate further the relationship between operating system and
hardware?
3. What are the primary differences between Network Operating System
and Distributed Operating System?
4. What are the differences between Real Time System and Timesharing
System?

9. References (at least 3 references preferably copyrighted within the last 5 years,
alphabetically arranged)
Operating System. Retrieved from https://www.tutorialspoint.com/
operating_system/
Operating System. Retrieved from https://www.geeksforgeeks.org/types-
ofoperating-systems/
Abeeda SK, Lectures notes on Operating System 2018-2019. Retrieved from
https://www.crectirupati.com

https://www.tutorialspoint.com/Protection-and-Security-in-Operating-
System#:~:text=Protection%20and%20security%20requires%20that,CPU
%2C%20softwares%2C%20memory%20etc.&text=This%20can%20be%2
0done%20by,access%2C%20viruses%2C%20worms%20etc.

ISUE–CCSICT –IM-092 - Instruction Material Page 17


ISUE__ __ Syl ___
Revision: 02
Effectivity: August 1, 2020

You might also like