Page 24 - DCAP403_Operating System
P. 24

Unit 2: Operation and Function of Operating System




          Protection                                                                            Notes

          The various processes in an operating system must be protected from each other’s activities. For

          that purpose, various mechanisms which can be used to ensure that the files, memory segment,
          CPU and other resources can be operated on only by those processes that have gained proper
          authorisation from the operating system.

                Example: Memory addressing hardware ensures that a process can only execute within
          its own address space. The timer ensures that no process can gain control of the CPU without
          relinquishing it. Finally, no process is allowed to do its own I/O, to protect the integrity of
          the various peripheral devices. Protection refers to a mechanism for controlling the access of

          programs, processes, or users to the resources defined by a computer controls to be imposed,
          together with some means of enforcement.
          Protection can improve reliability by detecting latent errors at the interfaces between component
          subsystems. Early detection of interface errors can often prevent contamination of a healthy
          subsystem by a subsystem that is malfunctioning. An unprotected resource cannot defend
          against use (or misuse) by an unauthorised or incompetent user.




              Task    “Memory is the most expensive part of system.” Discuss.


          Networking


          A distributed system is a collection of processors that do not share memory or a clock. Instead, each
          processor has its own local memory, and the processors communicate with each other through
          various communication lines, such as high speed buses or telephone lines. Distributed systems
          vary in size and function. They may involve microprocessors, workstations, minicomputers, and
          large general purpose computer systems.

          The processors in the system are connected through a communication network, which can be

          configured in the number of different ways. The network may be fully or partially connected.
          The communication network design must consider routing and connection strategies and the
          problems of connection and security.
          A distributed system provides the user with access to the various resources the system maintains.
          Access to a shared resource allows computation speed-up, data availability, and reliability.

          Command Interpretation

          One of the most important components of an operating system is its command interpreter. The
          command interpreter is the primary interface between the user and the rest of the system.
          Many commands are given to the operating system by control statements. When a new job is
          started in a batch system or when a user logs-in to a time-shared system, a program which reads
          and interprets control statements is automatically executed. This program is variously called
          (1) the control card interpreter, (2) the command line interpreter, (3) the shell (in Unix), and so on.
          Its function is quite simple: get the next command statement, and execute it.
          The command statements themselves deal with process management, I/O handling, secondary

          storage management, main memory management,  file system access, protection, and
          networking.





                                           LOVELY PROFESSIONAL UNIVERSITY                                    17
   19   20   21   22   23   24   25   26   27   28   29