Documente Academic
Documente Profesional
Documente Cultură
1. Mainframe systems
I. Batch Systems
II. Multiprogrammed Systems
III. Time-Sharing Systems
2. Desktop systems
3. Multiprocessor systems
4. Distributed systems
5. Clustered systems
6. Real Time systems
7. Handheld systems
Mainframe System:
i. Batch System
ii. Multiprogrammed Systems
iii. Time-sharing systems
I. Batch System
Punch card is used to give the input in Batch System
1
To increase the speed, jobs with similar types are grouped for
execution (Example: Payroll Jobs, Leave Jobs, Accounts Job).
II. CPU is often idle, because the speed of the mechanical I/O
devices is slower than the CPU.
If several jobs are ready to run at the same time, then the system chooses
which one to run through the process of CPU Scheduling (What is CPU
Scheduling).
2
Job Pool / Job Queue Stores all the Jobs. The operating system keeps
several jobs in memory simultaneously as shown in below Figure 2.
3
Figure 3: Time-sharing systems or Multitasking System
4
This ability to continue providing service to the level of surviving hardware
is called Graceful Degradation (What is Graceful Degradation).
5
Types of Distributed Systems (Two Types)
i. Client-Server Systems
ii. Peer-to-Peer Systems
i. Computer-Server Systems :
Computer-Server system receives and executes the client system
requests and send back the results to the client systems.
Peer-to-Peer Systems
It contains collection of processors that do not share memory or a
clock. Instead, each processor has its own local memory.
The processors communicate with one another through various
communication lines, such as high-speed buses or telephone lines.
These systems are usually referred to as loosely coupled systems (or
distributed systems).
Clustered Systems
In clustered OS, multiple computers are working together and sharing
storage via LAN network OR Storage-Area Network (SAN).
It provides high availability.
A layer of cluster software runs on the cluster nodes. Each node can
monitor one or more other nodes.
If the monitored machine fails, the monitoring machine can take
ownership of its storage, and restart the application.
Types of Clustering:
1 . Asymmetric clustering
2. Symmetric mode
Asymmetric clustering
In asymmetric clustering, one machine is in hot standby mode
and the other nodes are running the applications.
The hot standby machine, monitor the Active Server. If the Server
fails, then hot standby host will be become the active server.
Symmetric mode
In symmetric mode, two or more hosts are running applications, and they
are monitoring each other. This mode is more efficient because it uses all
the available hardware.
Parallel Cluster:
Parallel clusters allow multiple hosts to access the same data on the shared
storage example : Oracle Parallel Server.
Distributed Lock Manger (DLM)
7
DLM mechanism is helps to avoid conflicting operations in Cluster systems.
Handheld systems
Handheld system is small in size with Internet connection.
8
Example: Cell Phones, personal digital assistants (PDAs) and Palm-
Pilots.
It contains lower speed processors and less memory ie. Memory size
between 512 KB and 8 MB with the slow processor.
It has a small display screen and Displaying the content of a web
page in Handheld device is called Web Clipping.
10
components. by a network and implemented via shared
Includes general device-driver and memory or message passing.
Drivers for specific hardware devices.
Networking Accounting:
In distributed systems, the processors The operating system keep track of users
communicate with one another through network. resource utilization information for
So, The communication-network design must accounting.
consider
routing and connection strategies
The problems of contention and security.
Command-Interpreter System: Protection:
Command interpreter is interface between the Protection ensures that all access to system
user and the operating system. is authenticated and controlled.
It gets the input from the user and executes the
given command. The Other names of Command
Line Interpreter is
1. Control Card interpreter
2. Shell in Unix System
Write about the Operating System structure?
There are two main forms to organize the system structure:
1. Simple structure
2. Layered approach
11
Figure : MS-DOS layer structure.
12
Figure: UNIX system structure
Layered approach
In Layered Approach, the operating system is divided into a number of
layers (levels), each built on top of lower layers. The bottom layer (layer 0)
is the hardware and the highest (layer N) is the user interface. Each layer
uses functions
(operations) and services
of only lower-level layers.
Layered approach is used
for modularization of the
OS. This approach
simplifies the debugging
and system verification.
In OS/2 system, the application layer can not directly access the
bottom layer.
ie. The upper layer only can access the lower layer.
Advantage:
It provides high level security and OS upgrade is easy.
13
Figure : OS/2 layer structure
Microkernels
Advantages of Microkernels
1. Operating system upgrade process is easy.
2. It provides more security and reliability.
Virtual Machines:
In virtual Machine, the operating system creates the illusions like each
user or process have their own processor and memory.
14
A virtual machine has virtual memory, virtual disks, virtual printer,
virtual console, virtual processor and virtual communication network.
15
the bytecode does not perform pointer arithmetic, which could potentially
provide illegal memory access. If the class passes verification, it is run by
the Java interpreter. Java Interpreter or Just In Time (JIT) converts the
bytecode into Native Machine Language for host computer.
16