Tybcs Os Chapter 1
Tybcs Os Chapter 1
Tybcs Os Chapter 1
Here are the details about Operating Systems and their types:
1. *Single-User Operating System*: Allows only one user to access the computer at a
time. (Example: MS-DOS)
7. *Mobile Operating System*: Designed for mobile devices such as smartphones and
tablets. (Example: Android, iOS)
10. *Network Operating System*: Manages network resources and provides network
services. (Example: Windows Server, Linux Server)
There are several types of Operating Systems which are mentioned below.
Disadvantages of Time-Sharing OS
❖ Reliability problem.
❖ One must have to take care of the security and integrity of user programs and data.
❖ Data communication problem.
❖ Advantages of RTOS
❖ Maximum Consumption: Maximum utilization of devices and
systems, thus more output from all the resources.
❖ Task Shifting: The time assigned for shifting tasks in these systems is
very less.
❖ Disadvantages of RTOS
❖ Limited Tasks: Very few tasks run at the same time and their
concentration is very less on a few applications to avoid errors.
❖ Use heavy system resources: Sometimes the system resources are
not so good and they are expensive as well.
There are four layers that make up the MS-DOS operating system, and each has
its own set of features.
• These layers include ROM BIOS device drivers, MS-DOS device drivers,
application programs, and system programs.
• The MS-DOS operating system benefits from layering because each level can be
defined independently and, when necessary, can interact with one another.
• If the system is built in layers, it will be simpler to design, manage, and update.
Because of this, simple structures can be used to build constrained systems
that are less complex.
• When a user program fails, the operating system as whole crashes.
• Because MS-DOS systems have a low level of abstraction, programs and I/O
procedures are visible to end users, giving them the potential for unwanted
access.
The monolithic operating system controls all aspects of the operating system’s
operation, including file management, memory management, device
management, and operational operations.
The core of an operating system for computers is called the kernel (OS). All
other System components are provided with fundamental services by the
kernel. The operating system and the hardware use it as their main interface.
When an operating system is built into a single piece of hardware, such as a
keyboard or mouse, the kernel can directly access all of its resources.
• Note :- Diagram Refer From Textbook For this Structure
• Advantages of Monolithic Structure:
• Because layering is unnecessary and the kernel alone is responsible for
managing all operations, it is easy to design and execute.
• Due to the fact that functions like memory management, file
management, process scheduling, etc., are implemented in the same
address area, the monolithic kernel runs rather quickly when compared
to other systems. Utilizing the same address speeds up and reduces the
time required for address allocation for new processes.
These layers are organized hierarchically, with the top-level layers making
use of the capabilities of the lower-level ones.
4 . MICRO-KERNEL STRUCTURE
Each Micro-Kernel is created separately and is kept apart from the others.
As a result, the system is now more trustworthy and secure. If one Micro-
Kernel malfunctions, the remaining operating system is unaffected and
continues to function normally.
The image below shows Micro-Kernel Operating System Structure:
of vite importane
needto
obiousiy
Coeott: deleke
the ler by
roetpoineo to
CommunicetHoo
ekchangê Infocmaton2i+hwlaaDoth
tateplace beteseeniio(ei
thatane
Computee
OTie setond tataplace sbetuoePoter
diffeendcompte
thet
Systemr
ae
eketuti
tht Areie toeetheby
Compatee
Error detectoati
Rtinlyneel
operathg Systeo
Shoul c approateacton to
vi Resourro io
meiple users
the System mltiple jobs Qne nning
the Same time..+Olouycer be
allocated itegch ot them
any diffetat typo of
Operting&ysfem ct
Spacieocatiogcode
Morqeneiel eguest
O 74 invouei ensuing thaal accefr
to the
e f the Syston fomrout _l do itt
importaDi Sucha setrity Sfrt
Coith uthen Hqet
hinelt
ch
to the
having
Sis terD usuely
meano
to accesrthe' yesouCCes
system
to the
2ultpemission not aila ble
Iloperformuith
the
Systrn
any arbl4 arfpre Sont
ny fióoof
emmunica tonith o1hec
th usecof uied
SysttnClls
Sozriponing Pooeolu their
liabrat theae tproce
Daranete ureptt tho
ofa Systt0
Systen icalstn
tSparifled plate -Such ar mahino
toSteothe kopiastnttn ion
opisaggystem
liabray praresltee pepore
detalfntthetrapinstuctjon
Call Aystem
an
re chu
these aste ohale
prrocemrirne
C.P,U haiha mocler
Praggaal
Aroteeked meo
Pape No :
Date:
ce ystem Cal
Wosking
iacohich toste+ion
Caaekeele normnsrma iastuttton,psivill
ohichlo
nt
Rcetainathe riitnstvctt,
loitcAeee ereonosn
instnctiod
t taddatefrom imple
to
py theoto iana thet filele
0theit ioput thst
neeiS the. namer of 2 iler
9bteloed
leCe nthe
sfthesp! onothe
2encoun tr possible
Eachrdute
tatdrneintmaa
oAsile
gading
etein
must
Condiion
Fnly afe the entic file
the is copied
wk pjranmay
a both the flei
fer. of Syshm call
O Proetr gobcootto!
Anningp6ronCpxorerr)needto be
oble tohatits eetutinAl eithenarmly
Cendorbnor mallyif fhe pogm
uninto.q p r o b l e m c s e s g n x
trop ump ofmenonys tate ond
eTnrmengeened Can be
ekamioed by bu geeSomeoflthe comm
de br
de
ar folor
to
conso Can be tca
be go9nted the proJsm.
the Use -pyog m , o t heIS
Suficieni
hausto
Qyailable
filecan be
oxvetueuice.h
Sysmi Callrfor
oeedefdeyicel
fiaished
Same theyedee theydeicet
eeeuice
evicemNS genent Syatem
Reqiestevice
deyice +he
Ralesedelce l: Releaa^euice
finishedideulc fte
Read
-purpate
device4
{ite Managônent
SysenC Sornof
managemtntSystenLC ctre fo/oust
Openit
iiis open
Ciu closeati le
closeclose indicatlathA.
file i neongeinl use
fite
ty Pe pontection Cader faceountn
coder foccontagioto
mation
11anaqemeat
Same
the patpslegftnfn intoematon.
the
Lafacmatonaboh
Sinfamaion2Systm c a l a r e ar
scdovieiuto
Communiation
Thei
comonunicadto
intaxmtiog.
intpreceLECommunitlss failtiy
providedypeainz SySm
open close
Spen
cenneeon
Message pronyepasing iri Mse Fal
henSmey numbrofdato oeddi to
be erchange becaet
beyoided
UsmpmemaySySten coe
-eaing-witinainshora elada.
Petf
inuing
ing
to Son
1ha hey
localion sinnltaneny