Академический Документы
Профессиональный Документы
Культура Документы
EVALUATION
INTERNAL EXAMINOR
EXTERNL EXAMINOR
TOPIC
OPERATING SYSTEM
WEBSITES
1.
2.
3.
www.wikipedia.org
www.techtrget.com
www.webopedia.com
WEBSITE
http://en.wikipedia.org/wiki/Operating_system
Contents
1. Types of operating systems
1.1 Real-time
1.2 Multi-user
1.3 Multi-tasking vs. single-tasking
1.4 Distributed
1.5 Templated
1.6 Embedded
2. Components
2.1 Kernel
2.2 Networking
2.3 Security
2.4 User interface
Operating system
An operating system (OS) is software that manages computer hardware and software resources
and provides common services forcomputer programs. The operating system is an essential component of
the system software in a computer system. Application programs usually require an operating system to
function.
Time-sharing operating systems schedule tasks for efficient use of the system and may also include
accounting software for cost allocation of processor time, mass storage, printing, and other resources.
For hardware functions such as input and output and memory allocation, the operating system acts as an
intermediary between programs and the computer hardware, [1][2] although the application code is usually
executed directly by the hardware and will frequently make a system call to an OS function or be
interrupted by it. Operating systems can be found on almost any device that contains a computer
from cellular phones and video game consoles to supercomputers and web servers.
Multi-user
A multi-user operating system allows multiple users to access a computer system at the same time.
Time-sharing systems and Internet servers can be classified as multi-user systems as they enable multiple-user
access to a computer through the sharing of time. Single-user operating systems have only one user but may
allow multiple programs to run at the same time.
Distributed
A distributed operating system manages a group of independent computers and makes them appear to
be a single computer. The development of networked computers that could be linked and communicate with
each other gave rise to distributed computing. Distributed computations are carried out on more than one
machine. When computers in a group work in cooperation, they make a distributed system.
Templated
In an OS, distributed and cloud computing context, templating refers to creating a single virtual
machine image as a guest operating system, then saving it as a tool for multiple running virtual machines
(Gagne, 2012, p. 716). The technique is used both in virtualization and cloud computing management, and is
common in large server warehouses.
Embedded
Embedded operating systems are designed to be used in embedded computer systems. They are
designed to operate on small machines like PDAs with less autonomy. They are able to operate with a limited
number of resources. They are very compact and extremely efficient by design. Windows CE and Minix 3 are
some examples of embedded operating systems.
Components
The components of an operating system all exist in order to make the different parts of a
computer work together. All user software needs to go through the operating system in order to
use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an
Internet component.
Kernel
Networking
Currently most operating systems support a variety of networking protocols, hardware,
and applications for using them. This means that computers running dissimilar operating systems
can participate in a common network for sharing resources such as computing, files, printers, and
scanners using either wired or wireless connections. Networks can essentially allow a computer's
operating system to access the resources of a remote computer to support the same functions as it
could if those resources were connected directly to the local computer. This includes everything
6
from simple communication, to using networked file systems or even sharing another computer's
graphics or sound hardware. Some network services allow the resources of a computer to be
accessed transparently, such as SSH which allows networked users direct access to a computer's
command line interface.
Client/server networking allows a program on a computer, called a client, to connect via a
network to another computer, called a server. Servers offer (or host) various services to other
network computers and users. These services are usually provided through ports or numbered
access points beyond the server's network address. Each port number is usually associated with a
maximum of one running program, which is responsible for handling requests to that port. A
daemon, being a user program, can in turn access the local hardware resources of that computer
by passing requests to the operating system kernel.
Many operating systems support one or more vendor-specific or open networking
protocols as well, for example, SNA on IBM systems, DECnet on systems from Digital
Equipment Corporation, and Microsoft-specific protocols (SMB) on Windows. Specific
protocols for specific tasks may also be supported such as NFS for file access. Protocols
like ESound, or esd can be easily extended over the network to provide sound from local
applications, on a remote system's sound hardware.
Security
A computer being secure depends on a number of technologies working properly. A
modern operating system provides access to a number of resources, which are available to
software running on the system, and to external devices like networks via the kernel.
The operating system must be capable of distinguishing between requests which should
be allowed to be processed, and others which should not be processed. While some systems may
simply distinguish between "privileged" and "non-privileged", systems commonly have a form
of requester identity, such as a user name. To establish identity there may be a process
of authentication. Often a username must be quoted, and each username may have a password.
Other methods of authentication, such as magnetic cards or biometric data, might be used
instead. In some cases, especially connections from the network, resources may be accessed with
7
no authentication at all (such as reading files over a network share). Also covered by the concept
of requester identity is authorization; the particular services and resources accessible by the
requester once logged into a system are tied to either the requester's user account or to the
variously configured groups of users to which the requester belongs.
In addition to the allow/disallow model of security, a system with a high level of security
will also offer auditing options. These would allow tracking of requests for access to resources
(such as, "who has been reading this file?"). Internal security, or security from an already running
program is only possible if all possibly harmful requests must be carried out through interrupts to
the operating system kernel. If programs can directly access hardware and resources, they cannot
be secured.
External security involves a request from outside the computer, such as a login at a
connected console or some kind of network connection. External requests are often passed
through device drivers to the operating system's kernel, where they can be passed onto
applications, or carried out directly. Security of operating systems has long been a concern
because of highly sensitive data held on computers, both of a commercial and military nature.
The United States Government Department of Defense (DoD) created theTrusted Computer
System Evaluation Criteria (TCSEC) which is a standard that sets basic requirements for
assessing the effectiveness of security. This became of vital importance to operating system
makers, because the TCSEC was used to evaluate, classify and select trusted operating
systems being considered for the processing, storage and retrieval of sensitive or classified
information.
Internal security is especially relevant for multi-user systems; it allows each user of the
system to have private files that the other users cannot tamper with or read. Internal security is
also vital if auditing is to be of any use, since a program can potentially bypass the operating
system, inclusive of bypassing auditing.
User interface
A screenshot of the Bourne Again Shellcommand line. Each command is typed out after
the 'prompt', and then its output appears below, working its way down the screen. The current
command prompt is at the bottom.
Every computer that is to be operated by an individual requires a user interface. The user
interface is usually referred to as a shelland is essential if human interaction is to be supported.
The user interface views the directory structure and requests services from the operating system
that will acquire data from input hardware devices, such as a keyboard, mouse or credit card
reader, and requests operating system services to display prompts, status messages and such
on output hardware devices, such as a video monitor or printer. The two most common forms of
a user interface have historically been the command-line interface, where computer commands
are typed out line-by-line, and the graphical user interface, where a visual environment (most
commonly aWIMP) is present.
CONTENTS
1. OERATING SYSTEM DEFINITION
10
8. webOS (Palm/HP)
9. Windows Mobile (Windows Phone 7)
An operating system (sometimes abbreviated as "OS") is the program that, after being
initially loaded into the computer by a boot program, manages all the other programs in a
computer. The other programs are called applications or application programs. The application
programs make use of the operating system by making requests for services through a defined
application program interface (API). In addition, users can interact directly with the operating
system through a user interface such as a command language or a graphical user interface (GUI).
An operating system performs these services for applications:
In a multitasking operating system where multiple programs can be running at the same
time, the operating system determines which applications should run in what order and how
much time should be allowed for each application before giving another application a turn.
It handles input and output to and from attached hardware devices, such as hard disks,
printers, and dial-up ports.
It sends messages to each application or interactive user (or to a system operator) about
the status of operation and any errors that may have occurred.
It can offload the management of what are called batch jobs (for example, printing) so
that the initiating application is freed from this work.
On computers that can provide parallel processing, an operating system can manage how
to divide the program so that it runs on more than one processor at a time.
All major computer platforms (hardware and software) require and sometimes include an
operating system. Linux, Windows, VMS, OS/400, AIX, and z/OS are all examples of operating
systems.
SERVER OPERATING SYSTEM
server operating system, also called a server OS, is an operating system specifically designed to
run on servers, which are specialized computers that operate within a client/server architecture to
serve the requests of client computers on the network.
12
The server operating system, or server OS, is the software layer on top of which other software
programs, or applications, can run on the server hardware. Server operating systems help enable
and facilitate typical server roles such as Web server, mail server, file server, database server,
application server and print server.
Popular server operating systems include Windows Server, Mac OS X Server, and variants of
Linux such as Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise Server.
13
under
dessert-inspired codenames(Cupcake,
Donut,
Eclair,
Gingerbread,
Honeycomb, Ice Cream Sandwich) with each new version arriving in alphabetical order with
new enhancements and improvements.
14
7. Symbian OS (Nokia)
Symbian is a mobile operating system (OS) targeted at mobile phones that offers a high-level of
integration with communication and personal information management (PIM) functionality.
15
8. webOS (Palm/HP)
WebOS is a mobile operating system that runs on the Linux kernel. WebOS was initially
developed by Palm as the successor to its Palm OS mobile operating system. It is a proprietary
Mobile OS which was eventually acquired by HP and now referred to as webOS (lower-case w)
in HP literature. HP uses webOS in a number of devices including several smartphones and HP
TouchPads. HP has pushed its webOS into the enterprise mobile market by focusing on
improving security features and management with the release of webOS 3.x. HP has also
announced plans for a version of webOS to run within the Microsoft Windows operating system
and to be installed on all HP desktop and notebook computers in 2012.
16
CONTENTS
17
1. OPERATING SYSTEM
2. CLSSIFICATION OF OPERATING SYSTEM
MULTI USER
MULTI PROCESSING
MULTI TASING
MULTI THREADING
REAL TIME
OS OPERATING SYSTEM
18
The operating system is the most important program that runs on acomputer. Every
general-purpose computer must have an operating system to run other programs. Operating
systems perform basic tasks, such as recognizing input from the keyboard, sending output to
the display screen, keeping track of files anddirectories on the disk, and controlling peripheral
devices such asdisk drives and printers.
For large systems, the operating system has even greater responsibilities and powers. It is
like a traffic cop -- it makes sure that different programs and users running at the same time do
not interfere with each other. The operating system is also responsible for security, ensuring that
unauthorized users do not access the system.
19
user
interfaces allow
you
to
enter
commands
by
pointing
20
When you turn on your computer, it's nice to think that you're in control. There's the
trusty computer mouse, which you can move anywhere on the screen, summoning up your music
library or Internet browser at the slightest whim. Although it's easy to feel like a director in front
of your desktop or laptop, there's a lot going on inside, and the real man behind the curtain
handling the necessary tasks is the operating system.
Most desktop or laptop PCs come pre-loaded with Microsoft Windows. Macintosh
computers come pre-loaded with Mac OS X. Many corporate servers use the Linux or UNIX
operating systems. The operating system (OS) is the first thing loaded onto the computer -without the operating system, a computer is useless.
More recently, operating systems have started to pop up in smaller computers as well. If
you like to tinker with electronic devices, you're probably pleased that operating systems can
now be found on many of the devices we use every day, from cell phones to wireless access
points. The computers used in these little devices have gotten so powerful that they can now
actually run an operating system and applications. The computer in a typical modern cell phone
is now more powerful than a desktop computer from 20 years ago, so this progression makes
sense and is a natural development.
The purpose of an operating system is to organize and control hardware and software so
that the device it lives in behaves in a flexible but predictable way. In this article, we'll tell you
what a piece of software must do to be called an operating system, show you how the operating
system in your desktop computer works and give you some examples of how to take control of
the other operating systems around you.
21
operating systems do not interfere with each other or the various applications. Not to be confused
with operating system-level virtualization, which is a type of server virtualization.
operating
system
by
adding
networking
Artisoft's
22