Preview

IT 600 Module One Lecture

Better Essays
Open Document
Open Document
1256 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT 600 Module One Lecture
An operating system is a complex software infrastructure designed to provide an abstract set of interfaces and services for use by application processes (Franklin & Coustan, 2000;
Silberschatz, Galvin, & Gagne, 2009; Tanenbaum, 2008). The operating system manages the execution of these processes and controls their access to these interfaces and services.
Understanding how an operating system accomplishes this can best be achieved through examination of the major elements and technologies comprising the system, as well as an introduction to the problems and strategies involved in developing an operating system. The following sections of this lecture briefly introduce each of these topics. They will be explored in depth in successive course modules.

Process Management
Process management is required to manage the execution of multiple concurrent processes.
The operating system must be designed to enable multiple processes at the same time.
Since a CPU can run only one process at a time, process management must handle the scheduling and synchronization processes necessary for effective multitasking. Interprocess communication is complicated by the fact that processes do not actually execute simultaneously, but rather concurrently. This means that interprocess communications must be carefully synchronized. The operating system must be designed to ensure that process can access the resources without interfering with one another.

Memory Management
No process can be permitted to access a memory space that is allocated for exclusive use by another process. When multiple processes are running, each process has its memory allocation, and the operating system—usually with help from the hardware—must make sure that every process gets the memory it needs, and that no application can access memory in use by some other application. Moreover, the amount of memory required by the processes will often exceed what is physically available on the system. To remedy this, operating

IT



References: Bishop, M. (2003). Computer security: Art and Science. Boston, MA: Addison Wesley. Comer, D. (1984). Operating system design: The XINU approach. Englewood Cliffs, NJ: Prentice Hall. Custer, H. (1993). Inside Windows NT. Redmond, WA: Microsoft Press. Franklin, C., & Coustan, D. (2000, August 14). How operating systems work. Retrieved from http://computer.howstuffworks.com/operating-system1.htm Page, T. W., Weinstein, M. J., & Popek, G. J. (1985). Genesis: A distributed database operating system. Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts. Hoboken, NJ: John Wiley & Sons. Tanenbaum, A. (2008). Modern operating systems (3rd ed.). Upper Saddle River, NJ: Pearson.

You May Also Find These Documents Helpful

  • Good Essays

    Some OS routines directly support application programs as they run and thus must be resident. Other transient routines are stored on disk and read into memory only when needed. Fixed-length partitions can also be used to allocate the set amount of memory that a particular program needs to run. Under dynamic memory management, the transient area is treated as a pool of unstructured free space. When the system decides to load a particular program, a region of memory just sufficient to hold the program is allocated from the pool. Using segmentation, programs are divided into independently addressed segments and stored in noncontiguous memory. Paging breaks a program into fixed-length pages.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Stallings, W. ((2015)). Operating Systems: Internal and Design Principles, 8e. Retrieved from The University of Phoenix eBook Collection Database.…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    POS-355 Week 5 Operating Systems Analysis 10 Slides with Speaker Notes - Team B new ver.ppt…

    • 400 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 301 Words
    • 2 Pages

    |RAM |RAM is short for Random Access Memory and is a type of memory that is accessed |…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    POS355 Week 1 Individual

    • 574 Words
    • 2 Pages

    There are several items that are pertinent to memory management such as, basic hardware, the binding of symbolic memory addresses to definite physical addresses and the difference between logical and physical addresses. The most important task that memory management executes is the distribution and collection of memory…

    • 574 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Memory management is an important characteristic of an operating system. Main memory is divided into two parts one for resident programs, and the other for the program currently in use. The user part must be subdivided to accommodate multiple processes (Stallings, 2012). When a few processes are in the memory then much of the time all of the processes will have to wait for input /output and the processor will be idle. According to Stallings (2012),. The requirements that memory management is supposed to satisfy are Relocation, Protection, Sharing, Logical organization, and Physical…

    • 573 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BTEC ICT Unit 2 P1

    • 944 Words
    • 4 Pages

    A processor is also known as a CPU which stands for central processing unit, is how a computer/laptop functions and this is like the brain of the computer the better the processor is, the faster a computer works…

    • 944 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Random-access-memory (RAM) is a very important specification of the computer. By ensuring you have enough RAM, the faster your system processes, you can store more data, and allow more programs to run at the same time. As the OS allows the different task to complete for the processor, the RAM is used as temp storage, when the processor no longer needs them the OS clears it. Virtual memory is the hard drive space borrowed to use if there isn’t enough…

    • 580 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Guide to Unix Chapter 2

    • 999 Words
    • 4 Pages

    working on tasks and files that exceed the RAM capacity on chips in the computer?…

    • 999 Words
    • 4 Pages
    Good Essays
  • Good Essays

    stallings, W. (2012). operating systems internal and design principles (7th ed.). Upper Saddle River, NJ: prentice hall.…

    • 608 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Semester Project

    • 1691 Words
    • 5 Pages

    Memory is any kind of data stored up that can be used to apply/develop certain…

    • 1691 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Throughout the duration of this paper I will be discussing in depth some of…

    • 1451 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The CRK is based on the book Windows® Internals, 4th edition (Microsoft Press, 2004) by Mark Russinovich and David Solomon.…

    • 734 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Red Hat Enterprise Linux (RHEL) is a Linux-based operating system developed by Red Hat and targeted toward the commercial market. Red Hat Enterprise Linux is released in server versions for x86, x86-64, Itanium, PowerPC and IBM System z, and desktop versions for x86 and x86-64. All of Red Hat 's official support and training and the Red Hat Certification Program centers around the Red Hat Enterprise Linux platform. Red Hat Enterprise Linux is often abbreviated to RHEL, although this is not an official designation.…

    • 317 Words
    • 2 Pages
    Satisfactory Essays

Related Topics