西安电子科技大学:Operating-System Structures(PPT讲稿)

Operating-System Structures
Operating-System Structures

Outline Operating System Services User Operating System Interface · System ca|!s Types of System calls System Programs Operating System Design and Implementation Operating System Structure Operating System Debugging Operating system generation System Boot
Outline • Operating System Services • User Operating System Interface • System Calls • Types of System Calls • System Programs • Operating System Design and Implementation • Operating System Structure • Operating System Debugging • Operating System Generation • System Boot

Operating- system Services user and other system programs GUI batch command fine interfaces system calls progra rESoUrCe communication execution operations systems allocation accounting protection detection ser secunt operating system hardware
Operating-System Services

User Interfaces -Means by which users can issue commands to system a command -line interface(e.g sh, csh, ksh, tosh, etc. ) a gui interface(e.g. Windows, X-Windows, KDE, Gnome, etc. or a batch command systems. The latter are generally older systems using punch cards of job-control language, JCL, but may still be used today for specialty systems designed for a single purpose
• User Interfaces - Means by which users can issue commands to the system. • a command-line interface ( e.g. sh, csh, ksh, tcsh, etc. ), • a GUI interface ( e.g. Windows, X-Windows, KDE, Gnome, etc. ) • or a batch command systems. The latter are generally older systems using punch cards of job-control language, JCL, but may still be used today for specialty systems designed for a single purpose

Program EXecution- The os must be able to load a program into RAM, run the program, and terminate the program, either normally or abnormally. (process lifecycle) 70 Operations- The os is responsible for transferring data to and from /0 devices, including keyboards, terminals, printers, and storage devices File-System Manipulation -In addition to raw data storage the OS is also responsible for maintaining directory and subdirectory structures, mapping file names to specific blocks of data storage and providing tools for navigating and utilizing the file system
• Program Execution - The OS must be able to load a program into RAM, run the program, and terminate the program, either normally or abnormally.(process lifecycle) • I/O Operations - The OS is responsible for transferring data to and from I/O devices, including keyboards, terminals, printers, and storage devices. • File-System Manipulation - In addition to raw data storage, the OS is also responsible for maintaining directory and subdirectory structures, mapping file names to specific blocks of data storage, and providing tools for navigating and utilizing the file system

Communications-Inter-process communications, IPC, either between processes running on the same processor, or between processes running on separate processors or separate machines May be implemented as either shared memory or message passing, (or some systems may offer both Error detection- Both hardware and software errors must be detected and handled appropriately. Some systems may include complex error avoidance or recovery systems, including backups, RAID drives, and other redundant systems. Debugging and diagnostic tools aid users and administrators in tracing down the cause of problems
• Communications - Inter-process communications, IPC, either between processes running on the same processor, or between processes running on separate processors or separate machines. May be implemented as either shared memory or message passing, ( or some systems may offer both. ) • Error Detection - Both hardware and software errors must be detected and handled appropriately. Some systems may include complex error avoidance or recovery systems, including backups, RAID drives, and other redundant systems. Debugging and diagnostic tools aid users and administrators in tracing down the cause of problems

Resource allocation -E.g. CPU cycles, main memory, storage space, and peripheral devices Accounting -Keeping track of system activity and resource usage either for billing purposes or for statistical record keeping that can be used to optimize future performance
• Resource Allocation - E.g. CPU cycles, main memory, storage space, and peripheral devices. • Accounting - Keeping track of system activity and resource usage, either for billing purposes or for statistical record keeping that can be used to optimize future performance

Protection and Security-Preventing harm to the system and to resources, either through wayward internal processes or malicious outsiders Authentication, ownership, and restricted access are obvious parts of this system Highly secure systems may log all process activity down to excruciating detail, and security regulation dictate the storage of those records on permanent non-erasable medium for extended times in secure off-site facilities
• Protection and Security - Preventing harm to the system and to resources, either through wayward internal processes or malicious outsiders. • Authentication, ownership, and restricted access are obvious parts of this system. • Highly secure systems may log all process activity down to excruciating detail, and security regulation dictate the storage of those records on permanent non-erasable medium for extended times in secure ( off-site ) facilities

User Operating-System Interface Command Interpreter Graphical User Interface, GUI Choice of interface
User Operating-System Interface • Command Interpreter • Graphical User Interface, GUI • Choice of interface

Command Interpreter Gets and processes the next user request and launches the requested programs In some systems the cl may be incorporated directly into the kernel More commonly the cl is a separate program that launches once the user logs in or otherwise accesses the system
- Command Interpreter • Gets and processes the next user request, and launches the requested programs. • In some systems the CI may be incorporated directly into the kernel. • More commonly the CI is a separate program that launches once the user logs in or otherwise accesses the system
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 电子科技大学计算机学院:《现代密码学》课程PPT教学课件(密码学基础)第一章 引言.ppt
- 山东大学:《微机原理及单片机接口技术》课程教学资源(PPT课件讲稿)第九章 模数转换器与数模转换器.ppt
- 香港浸会大学:《Data Communications and Networking》课程教学资源(PPT讲稿)Chapter 10 Circuit Switching and Packet Switching.ppt
- 杭州电子科技大学:《计算机、互联网和万维网简介》教学资源(PPT课件)Chapter 01 C++ Programming Basics.ppt
- 《E-commerce 2014》电子商务(PPT讲稿)Chapter 5 E-commerce Security and Payment Systems.ppt
- 《WEB技术开发》教学资源(PPT讲稿)HTML AND CSS.ppt
- 《E-commerce 2014》电子商务(PPT讲稿)Chapter 12 B2B E-commerce:Supply Chain Management and Collaborative Commerce.ppt
- 清华大学出版社:《WEB技术开发》课程教学资源(PPT课件)第1章 WEB开发技术概述.ppt
- 《E-commerce 2014》电子商务(PPT讲稿)Chapter 9 Online Retail and Services.ppt
- 浙江大学:虚拟现实中基于图像的建模和绘制(报告PPT).ppt
- 生物信息数据分析技能培训:计算机基础技能培训(linux基础知识).pptx
- 大型综合程序范例解析(PPT讲稿).ppt
- 结构(9.1 构建手机通讯录 9.2 结构变量 9.3 结构数组 9.4 结构指针).ppt
- 浙江大学计算机系:网络图形技术 Chinagraph‘2000 讨论组.ppt
- 浙江大学:《计算机辅助设计与图形学》课程教学资源(PPT讲稿)基于图像的绘制技术 Image Based Rendering, IBR.ppt
- 浙江大学:循环结构(PPT讲稿).pptx
- 浙江大学:程序设计专题(PPT讲稿)结构化程序设计与递归函数(刘新国).pptx
- 耶鲁大学:A Sparse Parametric Mixture Model for BTF Compression, Editing and Rendering.ppsx
- 浙江大学计算机科学与技术学院:C语言程序设计基础与试验(PPT讲稿).ppt
- Python的基本应用(PYTHON的入门应用).pptx
- 《面向对象程序设计》课程PPT教学课件:第1章 Visual Basic概述(主讲:高慧).ppt
- JavaScript编程基础(JavaScript语法规则).ppt
- 长春大学旅游学院:《计算机网络与网络安全》课程教学资源(PPT课件)第6章 计算机网络与网络安全.ppt
- 《程序设计语言》课程PPT教学课件(章节大纲).ppt
- 《网络搜索和挖掘技术》课程教学资源(PPT讲稿)Lecture 1:Web Search Overview & Web Crawling.ppt
- 《编译原理》课程教学资源(PPT课件讲稿)第四章 语法分析——自上而下分析.ppt
- 赣南师范大学:《计算机网络技术》课程教学资源(PPT课件讲稿)第十章 Internet概述.ppt
- Java面向对象程序设计:Java的接口(PPT讲稿).pptx
- 动态内存分配器的实现(实验PPT讲稿).pptx
- 东南大学:《数据结构》课程教学资源(PPT课件讲稿)随机算法(主讲:方效林).pptx
- 中国科学技术大学:《现代密码学理论与实践》课程教学资源(PPT课件讲稿)第1章 引言(主讲:苗付友).pptx
- 《算法设计与分析 Design and Analysis of Algorithms》课程PPT课件:Tutorial 10.pptx
- 《C程序设计》课程PPT电子教案:第一章 概述.ppt
- 南京大学:《嵌入式网络物理系统》课程教学资源(PPT讲稿)时光自动机 Timed Automata.ppt
- 《PowerPoint》课程PPT教学课件:第六章 使用PowerPoint创建演示文稿.ppt
- 香港科技大学:Web-log Mining:from Pages to Relations.ppt
- 中国科学技术大学计算机学院:《高级操作系统 Advanced Operating System》课程教学资源(PPT课件)第四章 分布式进程和处理机管理(分布式处理机分配算法).ppt
- 清华大学:ICCV 2015 RIDE:Reversal Invariant Descriptor Enhancement.pptx
- 中国人民大学:Similarity Measures in Deep Web Data Integration.ppt
- 《数据结构》课程教学资源:课程PPT教学课件:绪论(数据结构讨论的范畴、基本概念、算法和算法的量度).ppt