• Non ci sono risultati.

Chapter 18

N/A
N/A
Protected

Academic year: 2021

Condividi "Chapter 18"

Copied!
31
0
0

Testo completo

(1)

Chapter 18

Three Operating Systems

The Architecture of Computer Hardware and Systems Software:

An Information Technology Approach 3rd Edition, Irv Englander

John Wiley and Sons 2003

Wilson Wong, Bentley College

Linda Senne, Bentley College

(2)

Three Operating Systems

 Microsoft Windows 2000/XP

 UNIX and Linux

 IBM zSeries z/OS

(3)

Microsoft Windows 2000/XP

 Design Goals

 Operating System Features

 User Environment

 Desktop Components

 Windows 2000/XP Architecture

 Overview

 System Block Diagram

 Logical Memory Map

(4)

Design Goals

 Extensibility

 Object-based modular design

 Portability

 Written in C and C++ to facilitate porting to other CPUs

 Reliability

 Kernel architecture design to protect from internal errors and buggy application programs

 Downward compatibility

 Compatible with earlier versions of Windows and DOS

 Scalability and Performance

 Supports symmetric multiprocessing

(5)

Operating System Features

 Single user 32-bit or 64-bit, pre-emptive multi-tasking operating system

 Powerful GUI that behaves consistently for local, network, and Internet use

 Support for new capabilities

 Multimedia, plug-and-play hardware, electrical power conservation

 Manageable and secure file system with built-in recoverability options and is downwardly compatible

 API that provides a wide range of services to simplify application development and ensure consistency

 Built-in networking and a new distributed file system

 Network server capabilities

(6)

User Environment

 Simple for novice, powerful for advanced user

 Tools, operations and applications that use the API behave in a consistent manner

 Extensive context-sensitive help

 User’s system parameters are modifiable

 Applications and users have access to the same services and interface features

 Tools and operations perform reasonably and

in an intuitive manner

(7)

Desktop Components

(8)

Windows 2000/XP Architecture

 Modified microkernel-based

 User mode

 Environmental subsystems

Expose OS services to the user through an API

 System support processes

Logon and user session management

 Server processes

 Protected (kernel) mode

 Hardware abstraction layer

 Kernel

 Executive layer

(9)

Executive Layer

 Object manager

 Provides standardized interface for objects

 Process manager

 Virtual memory manager

 I/O manager

 Security reference monitor

 All protected objects are monitored

 Enforces validation procedures and audits

 Local Procedure Call (LPC)

 Control of all service requests and interprocess activities

 Windowing and Graphics System

 Manages Windows graphics

 Provides Windows screen interface tools

(10)

Overview of Windows 2000

(11)

System Block Diagram

(12)

Logical Memory Map

(13)

UNIX and Linux

 Design Goals

 Pioneering Design Features

 Operating System Features

 User Environment

 General Organization

 Kernel operations

(14)

Design Goals

 Easy-to-use, interactive, powerful, and flexible interface

 Powerful programming tools

 Compilers and associated tools

 Use of small, simple utility programs to perform tasks and to construct more complex applications

 Small and simple kernel together with a separate interface shell

 Logical file system

 Multi-tasking and multiuser capabilities

 Simple system portability

(15)

Pioneering OS Design Features

 Process creation and control

 Separate shell for user interface

 Hierarchical directory file system

 Ability to combine small independent

software modules to accomplish a more

complex task

(16)

Operating System Features

 Preemptive multitasking with multiuser capability, automatic scheduling, and background execution

 User shells that provide an interactive

interface, commands, and programming tools

 Interactive process creation and management

 Hierarchical, tree-based file system

 Kernel

 Network administration tools

(17)

User Environment

 Login

 User name and password

 Start-up file for user environment customizations

 System, group, and user protections are set

 Interface shells

 Bourne shell, C shell, and Korn shell are the most commonly used

 Command line prompt

 X-Windows interface

 Logins to remote UNIX computers

(18)

General Organization of a

UNIX System

(19)

Kernel Operations

 Virtual storage and memory management

 Process management

 File management

 I/O management

 Networking and communication

(20)

Virtual Address Space for a

Process

(21)

IBM zSeries z/OS

 Design Goals

 Operating System Services

 User Environment

 User Interfaces

 MVS Organization

 Virtual Memory Map for a Task

 Data Management

(22)

Design Goals

 Maximize system performance and availability

 Maximize amount of processing by

providing support for execution of batch programs

 Minimize operator support effort

 Reliability

 Security

(23)

Virtual File System vs.

Socket Layered Structure

(24)

Operating System Services

 Sophisticated resource allocation services and workload management

 Data set management services

 Job and task management

 Virtual storage operation and management

 Network services

 Time-sharing support

 System resource logging, auditing and accounting

 Error detection, recovery, and logging

 Reassignment of tasks and data to other resources in the event of an error or failure

 System support programs and facilities

 Security services

 Large-scale cluster support

(25)

User Environment

 BCP, Base Control Program

 JCL, Job Control Language

 TSO, Time Sharing Option

 Used for program development and job preparation

 JES, Job Entry Subsystem

 Job submissions

 ISPF, Interactive System Productivity Facility

 Menu-driven facility that serves as an extension to TSO

 CICS, Customer Information Control System

 Application enabler that provides services to application programs that have been developed to work with it

 UNIX

(26)

User Interfaces

(27)

MVS Organization

(28)

Virtual Memory Map for a Task

(29)

Data Management

 Data sets

 z/OS files

 Sequential, random, or indexed sequential access

 Fixed or variable size

 Partitioned

Directory

Members - group of independent, related records

 Catalogs

 z/OS directories

 Master catalog for the system

 VTOC – catalog for a DASD (disk) device

 User catalog has an indexed entry in the master catalog

(30)

Steps in Location of a Data Set

(31)

Copyright 2003 John Wiley & Sons

All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the permissions Department, John Wiley & Songs, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the

information contained herein.”

Riferimenti

Documenti correlati

improprio di questo Servizio Software potrebbe comunque risultare in violazione della legge italiana.. 675 "Tutela delle Persone e di Altri Soggetti Rispetto al Trattamento

Questo ciclo legge i messaggi in attesa dalla coda messaggi dell’applicazione e rinvia il messaggio a Windows, che chiama quindi la funzione di finestra del programma

Per salvare un album, fare clic su [Yes]. Viene visualizzata la finestra di dialogo [Save As]. Specificare la posizione in cui si desidera salvare l’album, digitare il nome del

Innanzittutto con il tasto F8 si ordinano i dati nella finestra di Zoom per Ragione Sociale e quindi si imposta 'ROSSI’ su campo Ricerca della videata di zoom (con il tasto Tab ci

Potete rendere Statico questo stesso Indirizzo IP Dinamico, oppure sceglierne uno diverso, purché sia diverso dal valore Gateway predefinito (perché già usato dal router), si

Dispone di un firewall, di una sandbox e consente anche di abilitare la Modalità di gioco per ridurre l’impatto sulle risorse del sistema quando ci si vuole divertire con

Se si utilizza il portale di attivazione dei prodotti Trend Micro, toccare Installa per accedere a Chrome Web Store e installare l'estensione Trend Micro Security. In

Ora tornate nella schermata Start di Windows e digitate questa volta la parola centro (oppure connessione) quindi nel menù di ricerca che comparirà sulla destra del vostro