Skip to main content

OS theory Final- CPT.304 TPW

 An (OS) operating system is a powerful program that manages all of the software and hardware on a computer. There are often many computer programs running at the same time, some visual and some in the background, and they must access the CPU, memory, and storage to function correctly. There are several types of operating systems, but they all share a similar goal in efficiently and successfully operating the computer system. The major functions of the operating system include process management, device management, file management, communication and networking, security, and resource allocation. Some of the features that work with these functions are multitasking, multithreading, virtual memory, graphical user interface, IO devices, and computing.  When these functions and features of the OS are collaborating and working seamlessly together, it creates a magnificent operating system and allows the user to have a successful experience with the computer.  

Operating systems play a vital role in enabling processes to share and exchange information. Memory management is one of the biggest keys for optimal system performance. The main memory (RAM) is the hardware device in a computer that provides temporary storage for the operating system. The OS allocates and deallocates memory as needed from the RAM. Virtual memory is an extension of physical memory, and it ensures there is efficient memory use. Without the virtual memory, there would not be enough memory space in the computer, and it would cause an overrun of data. File management is important for organizing files within the OS and provides creation, modification, and access of the files. The OS also handles the communications for input and output devices such as a keyboard, mouse, monitor, and printer to ensure the reliable operation of these devices.  

Main memory and virtual memory work together using the memory management unit to allocate memory successfully. The functions of memory management are memory allocation, memory deallocation, memory protection, and memory mapping. The goals are to ensure efficient utilization of physical memory, isolation and protection, and use of virtual memory. Physical address space refers to the actual physical memory location in the computer system. Each physical address corresponds to a byte in physical memory. This is a limited amount of space that is accessed by hardware devices and the operating system kernel. Virtual address space is a logical abstraction of the physical address space. According to Silberschatz, A., Galvin, P. B., & Gagne, G. (2014) virtual memory abstracts main memory into an extremely large, uniform array of storage, separating logical memory as viewed by the user from physical memory. Each virtual address corresponds to a location in the virtual memory that is larger than the physical address space. This can solve memory management issues with increased capacity, utilization, and protection from memory errors.  

Files, mass storage, and I/O are handled by the OS so the user can have an efficient and convenient experience. When it comes to the integration across I/O and memory components, the Input and output operations involve data transfer between I/O devices and memory components. This integration is managed by the operating system and specialized hardware, such as, input/output controller, memory management unit, and cache. I/O operations are performed in the background allowing applications to continue to run simultaneously. When a user opens a file, the operating system finds the file on the mass storage device using the file system. The operating system then loads the file into memory so that the application can access it. When the application is finished with the file, the operating system writes the file back to the mass storage device. 

It is important to protect the system resources and ensure that security is a priority for a computer system. Domain- and language-based protection in a modern computer system is a security mechanism that aims to restrict the execution of unauthorized access to resources. An access matrix is a tool used in systems to control and manage the access rights of processes to specific resources. The matrix has rows that represent the subjects (processes or users), and the columns represent the objects (resources). Each cell in the matrix contains an access control entry that specifies the type of access a subject has to an object. Security measures are crucial for protecting programs, systems, and networks from various threats. These measures include authentication, access control, encryption, software security, and network segmentation. Authentication is the process of verifying the identity of users trying to access systems or data. Access control Prevents unauthorized physical access to devices and network.  

I intend to use these concepts about operating systems theory in several ways in the future. As a controls technician for an industrial gas company, I deal with operating systems daily, and this can help with troubleshooting and designing systems. Understanding these concepts helps me pick out the correct machine to successfully carry out the tasks I need at a plant. It also helps me fix issues with new and old systems as I can nail down the issue to a specific component of a system. For example, I noticed this week that the hard drive on a computer was almost full, and the machine was freezing and not operating properly. I was able to order a larger SSD (Solid State Drive) machine and create a virtual image and run that on a virtual machine for the plant.  






 

Reference: 

Silberschatz, A., Galvin, P. B., & Gagne, G. (2014). Operating system concepts essentials (2nd ed.). Retrieved from https://redshelf.com/ 

Comments

Popular posts from this blog

Travelling Through a Network

  Thomas Wilson Packets move through networks from one computer to another. These tools are extremely useful when troubleshooting network configurations and if a network is talking or not. They move from devices like switches and routers until they reach the final destination. Packets usually move in specific order to their final destination. A ping and tracert command are different because the ping verifies that a host is reachable or not and the tracert command shows the detail of each stop at the routers and the time it takes to reach each router. When pinging each site, I noticed that the other countries website TTL is greater than google. This makes sense because the TTL is the determined "hop" time between servers before being dropped. When performing a tracert command, it shows each stop to the host's IP and the time it takes to get between each. Each tracert command gets longer in time to each host as it goes down the list. I noticed that google had 16 total stops...

Review Of Mobile/Web Application

Thomas Wilson Review of Boat Trader:   I have bought and sold multiple boats in my life using boat trader. The boat trader application is an excellent tool to filter and find distinctive style boats in a certain area. These boats can be offered by a dealership or a private seller. The biggest benefit of using boat trader is selecting a specific state or mileage away from a specific location that one is looking to purchase or sell from. There are many excellent features when it comes to this application but there are a couple of recommendations, I could give that I personally think would make it easier and more user friendly.    Usability:   The usability of the boat trader application is excellent overall. The initial home page of the site allows the user to select a drop down to either find, sell, or select services and research boats. If the user selects to "find" boats for sale, then it is directed to the next page where there are numerous filters that can be sele...