SlideShare une entreprise Scribd logo
1  sur  14
STRUCTURE OF AN
OPERATING SYSTEM
BY SIVANI M
An operating system has a complex structure, so we need a well-defined
structure to assist us in applying it to our unique requirements. Just as we
break down a big problem into smaller, easier-to-solve subproblems,
designing an operating system in parts is a simpler approach to do it. And each
section is an Operating System component. The approach of interconnecting
and integrating multiple operating system components into the kernel can be
described as an operating system structure. As mentioned below, various sorts
of structures are used to implement operating systems.
Different structures
•Simple Structure
•Monolithic Structure
•Layered Approach Structure
•Micro-kernel Structure
Simple Structure
It is the simplest Operating System Structure and is not well defined; It can only be used for small
and limited systems. In this structure, the interfaces and levels of functionality are well separated;
hence programs can access I/O routines which can cause unauthorized access to I/O routines.
This structure is implemented in MS-DOS operating system:
•The MS-DOS operating System is made up of various layers, each with its own set of functions.
•These layers are:
• Application Program
• System Program
• MS-DOS device drivers
• ROM BIOS device drivers
•Layering has an advantage in the MS-DOS operating system since all the levels can be defined
separately and can interact with each other when needed.
•It is easier to design, maintain, and update the system if it is made in layers. So that's why limited
systems with less complexity can be constructed easily using Simple Structure.
•If one user program fails, the entire operating system gets crashed.
•The abstraction level in MS-DOS systems is low, so programs and I/O routines are visible to the
end-user, so the user can have unauthorized access.
Layering in simple structure is shown below
Monolithic Structure
The Monolithic operating System in which the kernel acts as a manager by managing all things
like file management, memory management, device management, and operational processes of the
Operating System.
The kernel is the heart of a computer operating system (OS). Kernel delivers basic services to all
other elements of the System. It serves as the primary interface between the Operating System and
the hardware.
In monolithic systems, kernels can directly access all the resources of the operating System
like physical hardware, exp Keyboard, Mouse etc.
The monolithic kernel is another name for the monolithic operating system. Batch
processing and time-sharing maximize the usability of a processor by multiprogramming. The
monolithic kernel functions as a virtual machine by working on top of the Operating System and
controlling all hardware components. This is an outdated operating system that was used in banks
to accomplish minor activities such as batch processing and time-sharing, which enables many
people at various terminals to access the Operating System.
A Diagram of the Monolithic structure is shown
below:
Layered Approach
In this type of structure, OS is divided into layers or levels. The hardware is on the bottom layer (layer 0),
while the user interface is on the top layer (layer N). These layers are arranged in a hierarchical way in
which the top-level layers use the functionalities of their lower-level levels.
In this approach, functionalities of each layer are isolated, and abstraction is also available. In layered
structure, debugging is easier as it is a hierarchical model, so all lower-level layered is debugged, and then
the upper layer is checked. So all the lower layers are already checked, and the current layer is to be
checked only.
Micro-kernel
Micro-Kernel structure designs the Operating System by removing all non-essential components of
the kernel. These non-essential components of kernels are implemented as systems and user programs.
Hence these implemented systems are called as Micro-Kernels.
Each Micro-Kernel is made independently and is isolated from other Micro-Kernels. So this makes the
system more secure and reliable. If any Micro-Kernel fails, then the remaining operating System remains
untouched and works fine.
Operating System Debugging
Debugging is the process of finding the problems in a computer system and solving them. There are many
different ways in which operating systems perform debugging. Some of these are −
Log Files
The log files record all the events that occur in an operating system. This is done by writing all the
messages into a log file. There are different types of log files. Some of these are given as follows −
Event Logs
These stores the records of all the events that occur in the execution of a system. This is done so
that the activities of all the events can be understood to diagnose problems.
Transaction Logs
The transaction logs store the changes to the data so that the system can recover from crashes
and other errors. These logs are readable by a human.
Message Logs
These logs store both the public and private messages between the users. They are mostly plain
text files, but in some cases they may be HTML files.
Core Dump Files
The core dump files contain the memory address space of a process that terminates unexpectedly. The
creation of the core dump is triggered in response to program crashes by the kernel. The core dump files
are used by the developers to find the program’s state at the time of its termination so that they can find
out why the termination occurred.
The automatic creation of the core dump files can be disabled by the users. This may be done to improve
performance, clear disk space or increase security.
Crash Dump Files
In the event of a total system failure, the information about the state of the operating system
is captured in crash dump files. There are three types of dump that can be captured when a
system crashes. These are −
Complete Memory Dump
The whole contents of the physical memory at the time of the system crash are captured in the
complete memory dump. This is the default setting on the Windows Server System.
Kernel Memory Dump
Only the kernel mode read and write pages that are present in the main memory at the time of
the system crash are stored in the kernel memory dump.
Small Memory Dump
This memory dump contains the list of device drivers, stop code, process and thread information, kernel
stack etc.
Trace Listings
The trace listing record information about a program execution using logging. This information is used
by programmers for debugging. System administrators and technical personnel can use the trace listings
to find the common problems with software using software monitoring tools.
Profiling
This is a type of program analysis that measures various parameters in a program such as space and time
complexity, frequency and duration of function calls, usage of specific instructions etc. Profiling is done
by monitoring the source code of the required system program using a code profiler.
SYSTEM BOOT
• The BIOS, operating system and hardware components of a computer system should all be working
correctly for it to boot. If any of these elements fail, it leads to a failed boot seq.
System boot process
The following diagram demonstrates the steps involved in a system boot process −
•The CPU initializes itself after the power in the computer is first turned on. This is done by
triggering a series of clock ticks that are generated by the system clock.
•After this, the CPU looks for the system’s ROM BIOS to obtain the first instruction in the start-up
program. This first instruction is stored in the ROM BIOS and it instructs the system to run POST
(Power On Self Test) in a memory address that is predetermined.
•POST first checks the BIOS chip and then the CMOS RAM. If there is no battery failure detected
by POST, then it continues to initialize the CPU.
•POST also checks the hardware devices, secondary storage devices such as hard drives, ports etc.
And other hardware devices such as the mouse and keyboard. This is done to make sure they are
working properly.
•After POST makes sure that all the components are working properly, then the BIOS finds an
operating system to load.
•In most computer system’s, the operating system loads from the C drive onto the hard drive. The
CMOS chip typically tells the BIOS where the operating system is found.
•The order of the different drives that CMOS looks at while finding the operating system is known
as the boot sequence. This sequence can be changed by changing the CMOS setup.
•After finding the appropriate boot drive, the BIOS first finds the boot record which tells it to find
the beginning of the operating system.
•After the initialization of the operating system, the BIOS copies the files into the memory. Then the
operating system controls the boot process.
•In the end, the operating system does a final inventory of the system memory and loads the device
drivers needed to control the peripheral devices.
•The users can access the system applications to perform various tasks.
Without the system boot process, the computer users would have to download all the software
components, including the ones not frequently required. With the system boot, only those software
components need to be downloaded that are legitimately required and all extraneous components are
not required. This process frees up a lot of space in the memory and consequently saves a lot of time.

Contenu connexe

Similaire à Structure of an operating system.pptx

OS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.pptOS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.pptnaghamallella
 
operating system1.pdf
operating system1.pdfoperating system1.pdf
operating system1.pdfGanesh198271
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's usesSurya Vishnuram
 
1. What is the value of requiring the OS to provide status informati.pdf
1. What is the value of requiring the OS to provide status informati.pdf1. What is the value of requiring the OS to provide status informati.pdf
1. What is the value of requiring the OS to provide status informati.pdfudit652068
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System MaqdamYasir
 
lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categoriesWajeehaBaig
 
services and system calls of operating system
services and system calls of operating system services and system calls of operating system
services and system calls of operating system Saurabh Soni
 
Introduction to OS.pptx
Introduction to OS.pptxIntroduction to OS.pptx
Introduction to OS.pptxtaruian
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptKirti Verma
 

Similaire à Structure of an operating system.pptx (20)

OS-20210426203801.ppt
OS-20210426203801.pptOS-20210426203801.ppt
OS-20210426203801.ppt
 
OS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.pptOS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.ppt
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
operating system1.pdf
operating system1.pdfoperating system1.pdf
operating system1.pdf
 
Basic operating systems in computer and it's uses
Basic operating systems in computer and it's usesBasic operating systems in computer and it's uses
Basic operating systems in computer and it's uses
 
1. What is the value of requiring the OS to provide status informati.pdf
1. What is the value of requiring the OS to provide status informati.pdf1. What is the value of requiring the OS to provide status informati.pdf
1. What is the value of requiring the OS to provide status informati.pdf
 
OS - Operating System
OS - Operating System OS - Operating System
OS - Operating System
 
lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categories
 
OS Structure
OS StructureOS Structure
OS Structure
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
services and system calls of operating system
services and system calls of operating system services and system calls of operating system
services and system calls of operating system
 
Introduction to OS.pptx
Introduction to OS.pptxIntroduction to OS.pptx
Introduction to OS.pptx
 
OS.pptx
OS.pptxOS.pptx
OS.pptx
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
 
OS_Intro_Chap_1.ppt
OS_Intro_Chap_1.pptOS_Intro_Chap_1.ppt
OS_Intro_Chap_1.ppt
 
Operating System 2.pptx
Operating System 2.pptxOperating System 2.pptx
Operating System 2.pptx
 
Ch1 - OS.pdf
Ch1 - OS.pdfCh1 - OS.pdf
Ch1 - OS.pdf
 

Plus de MSivani

User and operating system interface.pptx
User and operating system interface.pptxUser and operating system interface.pptx
User and operating system interface.pptxMSivani
 
Communication in client server system.pptx
Communication in client server system.pptxCommunication in client server system.pptx
Communication in client server system.pptxMSivani
 
Process scheduling.pptx
Process scheduling.pptxProcess scheduling.pptx
Process scheduling.pptxMSivani
 
REST library.pptx
REST library.pptxREST library.pptx
REST library.pptxMSivani
 
Smart materials.pptx
Smart  materials.pptxSmart  materials.pptx
Smart materials.pptxMSivani
 
PROJECT LOON.pptx
PROJECT LOON.pptxPROJECT LOON.pptx
PROJECT LOON.pptxMSivani
 
Operating System Operations ppt.pptx
Operating System Operations ppt.pptxOperating System Operations ppt.pptx
Operating System Operations ppt.pptxMSivani
 
How to Install and Set up Android Studio.pptx
How to Install and Set up Android Studio.pptxHow to Install and Set up Android Studio.pptx
How to Install and Set up Android Studio.pptxMSivani
 
Computing Environments.pptx
Computing Environments.pptxComputing Environments.pptx
Computing Environments.pptxMSivani
 
ppt for phase-1 review-2.pptx
ppt for phase-1 review-2.pptxppt for phase-1 review-2.pptx
ppt for phase-1 review-2.pptxMSivani
 

Plus de MSivani (10)

User and operating system interface.pptx
User and operating system interface.pptxUser and operating system interface.pptx
User and operating system interface.pptx
 
Communication in client server system.pptx
Communication in client server system.pptxCommunication in client server system.pptx
Communication in client server system.pptx
 
Process scheduling.pptx
Process scheduling.pptxProcess scheduling.pptx
Process scheduling.pptx
 
REST library.pptx
REST library.pptxREST library.pptx
REST library.pptx
 
Smart materials.pptx
Smart  materials.pptxSmart  materials.pptx
Smart materials.pptx
 
PROJECT LOON.pptx
PROJECT LOON.pptxPROJECT LOON.pptx
PROJECT LOON.pptx
 
Operating System Operations ppt.pptx
Operating System Operations ppt.pptxOperating System Operations ppt.pptx
Operating System Operations ppt.pptx
 
How to Install and Set up Android Studio.pptx
How to Install and Set up Android Studio.pptxHow to Install and Set up Android Studio.pptx
How to Install and Set up Android Studio.pptx
 
Computing Environments.pptx
Computing Environments.pptxComputing Environments.pptx
Computing Environments.pptx
 
ppt for phase-1 review-2.pptx
ppt for phase-1 review-2.pptxppt for phase-1 review-2.pptx
ppt for phase-1 review-2.pptx
 

Dernier

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Dernier (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Structure of an operating system.pptx

  • 1. STRUCTURE OF AN OPERATING SYSTEM BY SIVANI M
  • 2. An operating system has a complex structure, so we need a well-defined structure to assist us in applying it to our unique requirements. Just as we break down a big problem into smaller, easier-to-solve subproblems, designing an operating system in parts is a simpler approach to do it. And each section is an Operating System component. The approach of interconnecting and integrating multiple operating system components into the kernel can be described as an operating system structure. As mentioned below, various sorts of structures are used to implement operating systems. Different structures •Simple Structure •Monolithic Structure •Layered Approach Structure •Micro-kernel Structure
  • 3. Simple Structure It is the simplest Operating System Structure and is not well defined; It can only be used for small and limited systems. In this structure, the interfaces and levels of functionality are well separated; hence programs can access I/O routines which can cause unauthorized access to I/O routines. This structure is implemented in MS-DOS operating system: •The MS-DOS operating System is made up of various layers, each with its own set of functions. •These layers are: • Application Program • System Program • MS-DOS device drivers • ROM BIOS device drivers •Layering has an advantage in the MS-DOS operating system since all the levels can be defined separately and can interact with each other when needed. •It is easier to design, maintain, and update the system if it is made in layers. So that's why limited systems with less complexity can be constructed easily using Simple Structure. •If one user program fails, the entire operating system gets crashed. •The abstraction level in MS-DOS systems is low, so programs and I/O routines are visible to the end-user, so the user can have unauthorized access.
  • 4. Layering in simple structure is shown below
  • 5. Monolithic Structure The Monolithic operating System in which the kernel acts as a manager by managing all things like file management, memory management, device management, and operational processes of the Operating System. The kernel is the heart of a computer operating system (OS). Kernel delivers basic services to all other elements of the System. It serves as the primary interface between the Operating System and the hardware. In monolithic systems, kernels can directly access all the resources of the operating System like physical hardware, exp Keyboard, Mouse etc. The monolithic kernel is another name for the monolithic operating system. Batch processing and time-sharing maximize the usability of a processor by multiprogramming. The monolithic kernel functions as a virtual machine by working on top of the Operating System and controlling all hardware components. This is an outdated operating system that was used in banks to accomplish minor activities such as batch processing and time-sharing, which enables many people at various terminals to access the Operating System.
  • 6. A Diagram of the Monolithic structure is shown below:
  • 7. Layered Approach In this type of structure, OS is divided into layers or levels. The hardware is on the bottom layer (layer 0), while the user interface is on the top layer (layer N). These layers are arranged in a hierarchical way in which the top-level layers use the functionalities of their lower-level levels. In this approach, functionalities of each layer are isolated, and abstraction is also available. In layered structure, debugging is easier as it is a hierarchical model, so all lower-level layered is debugged, and then the upper layer is checked. So all the lower layers are already checked, and the current layer is to be checked only.
  • 8. Micro-kernel Micro-Kernel structure designs the Operating System by removing all non-essential components of the kernel. These non-essential components of kernels are implemented as systems and user programs. Hence these implemented systems are called as Micro-Kernels. Each Micro-Kernel is made independently and is isolated from other Micro-Kernels. So this makes the system more secure and reliable. If any Micro-Kernel fails, then the remaining operating System remains untouched and works fine.
  • 9. Operating System Debugging Debugging is the process of finding the problems in a computer system and solving them. There are many different ways in which operating systems perform debugging. Some of these are − Log Files The log files record all the events that occur in an operating system. This is done by writing all the messages into a log file. There are different types of log files. Some of these are given as follows − Event Logs These stores the records of all the events that occur in the execution of a system. This is done so that the activities of all the events can be understood to diagnose problems. Transaction Logs The transaction logs store the changes to the data so that the system can recover from crashes and other errors. These logs are readable by a human. Message Logs These logs store both the public and private messages between the users. They are mostly plain text files, but in some cases they may be HTML files.
  • 10. Core Dump Files The core dump files contain the memory address space of a process that terminates unexpectedly. The creation of the core dump is triggered in response to program crashes by the kernel. The core dump files are used by the developers to find the program’s state at the time of its termination so that they can find out why the termination occurred. The automatic creation of the core dump files can be disabled by the users. This may be done to improve performance, clear disk space or increase security. Crash Dump Files In the event of a total system failure, the information about the state of the operating system is captured in crash dump files. There are three types of dump that can be captured when a system crashes. These are − Complete Memory Dump The whole contents of the physical memory at the time of the system crash are captured in the complete memory dump. This is the default setting on the Windows Server System. Kernel Memory Dump Only the kernel mode read and write pages that are present in the main memory at the time of the system crash are stored in the kernel memory dump.
  • 11. Small Memory Dump This memory dump contains the list of device drivers, stop code, process and thread information, kernel stack etc. Trace Listings The trace listing record information about a program execution using logging. This information is used by programmers for debugging. System administrators and technical personnel can use the trace listings to find the common problems with software using software monitoring tools. Profiling This is a type of program analysis that measures various parameters in a program such as space and time complexity, frequency and duration of function calls, usage of specific instructions etc. Profiling is done by monitoring the source code of the required system program using a code profiler.
  • 12. SYSTEM BOOT • The BIOS, operating system and hardware components of a computer system should all be working correctly for it to boot. If any of these elements fail, it leads to a failed boot seq. System boot process The following diagram demonstrates the steps involved in a system boot process −
  • 13. •The CPU initializes itself after the power in the computer is first turned on. This is done by triggering a series of clock ticks that are generated by the system clock. •After this, the CPU looks for the system’s ROM BIOS to obtain the first instruction in the start-up program. This first instruction is stored in the ROM BIOS and it instructs the system to run POST (Power On Self Test) in a memory address that is predetermined. •POST first checks the BIOS chip and then the CMOS RAM. If there is no battery failure detected by POST, then it continues to initialize the CPU. •POST also checks the hardware devices, secondary storage devices such as hard drives, ports etc. And other hardware devices such as the mouse and keyboard. This is done to make sure they are working properly. •After POST makes sure that all the components are working properly, then the BIOS finds an operating system to load. •In most computer system’s, the operating system loads from the C drive onto the hard drive. The CMOS chip typically tells the BIOS where the operating system is found. •The order of the different drives that CMOS looks at while finding the operating system is known as the boot sequence. This sequence can be changed by changing the CMOS setup. •After finding the appropriate boot drive, the BIOS first finds the boot record which tells it to find the beginning of the operating system.
  • 14. •After the initialization of the operating system, the BIOS copies the files into the memory. Then the operating system controls the boot process. •In the end, the operating system does a final inventory of the system memory and loads the device drivers needed to control the peripheral devices. •The users can access the system applications to perform various tasks. Without the system boot process, the computer users would have to download all the software components, including the ones not frequently required. With the system boot, only those software components need to be downloaded that are legitimately required and all extraneous components are not required. This process frees up a lot of space in the memory and consequently saves a lot of time.