Types of operating systems
A single-tasking system can only run one program at a time, while a multitasking operating system allows more than one program to be running
in concurrency. This is achieved by time-sharing, where the available processor time is divided
between multiple processes. These processes are each interrupted repeatedly in time slices by a task-
scheduling subsystem of the operating system. Multi-tasking may be characterized in preemptive and
co-operative types.
In preemptive multitasking, the operating system slices the CPU time and dedicates a
slot to each of the programs. Unix-like operating systems, such as Linux—as well as
non-Unix-like, such as AmigaOS—support preemptive multitasking. Cooperative
multitasking is achieved by relying on each process to provide time to the other
processes in a definedmanner.
1. Single-tasking and multi-tasking
Single-user operating systems have no facilities to distinguish users, but may allow
multiple programs to run in tandem(run like cycle). A multi-user operating system
extends the basic concept of multi-tasking with facilities that identify processes and
resources, such as disk space, belonging to multiple users, and the system permits
multiple users to interact with the system at the same time. Time-sharing operating
systems schedule tasks for efficient use of the system and may also include
accounting software for cost allocation of processor time, mass storage, printing,
and otherresources to multiple users.
2. Single- and multi-user
Single-user operating systems have no facilities to distinguish users, but may allow multiple programs
to run n tandem(run like cycle). A multi-user operating system extends the basic concept of multi-
tasking with facilities that identify processes and resources, such as disk space, belonging to multiple
users, and the system permits multiple users to interact with the system at the same time.
3. Distributed
Distributed operating systemmanages a group of distinct, networked computers
and makes them appear to be a single computer, as all computations
are distributed (divided amongst the constituent computers)
In the distributed and cloud computing context of an OS, templating refers to creating
a single virtual machine image as a guest operating system, then saving it as a tool
for multiple running virtual machines. The technique is used both
in virtualization and cloud computing management, and is common in large server
warehouses
4. Templated
In the distributed and cloud computing context of an OS, templating refers to creating
a single virtual machine image as a guest operating system, then saving it as a tool
for multiple running virtual machines. The technique is used both in virtualization and cloud
computing management, and is common in large server warehouses
5. Real-time
A real-time operating system is an operating system that guarantees to
process events or data by a specific moment in time. A real-time operating system
may be single- or multi-tasking, but when multitasking, it uses specialized
scheduling algorithms so that a deterministic nature of behavior is achieved. Such
an event-driven system switches between tasks based on their priorities or
external events, whereas time-sharing operating systems switch tasks based on
clock interrupts
Virtual memory
Virtual memory is a section of volatile memory created temporarily on the storage drive. It
is createdwhen a computeris running many processes at once and RAMis running low.
The operating system makes part of the storage drive available to use as RAM. Virtual
memory is much slower than main memory because processing power is being taken up
by moving data around, rather than just executing instructions. The guide on operating
systems explains howthe OS managesmemory.
Latency is increasedwhen the computer needs to use virtualmemory
Concept of Booting
Booting / Swapping
Booting is basically the process of starting the computer. When the CPU is first switched
on it has nothing inside the Memory. In order to start the Computer, load the Operating
System into the Main Memory and then Computer is ready to take commands from the
User. Learn the types of booting.
What happens in the Process of Booting?
Booting happens when you start the computer. This happens when we turned ON the
power or the computerrestarts. The systemBIOS (Basic Input/Output System) makes the
peripheral devices active. Further, it requires that the boot device loads the operating
system into the main memory.
Types of Booting
There are two types of booting:
Cold Booting
A cold boot is also called a hard boot. It is the process when we first start the computer. In
other words, when the computer is started from its initial state by pressing the power
button it is called cold boot. The instructions are read from the ROM and the operating
system is loaded in the main memory.
Warm Booting
Warm Boot is also called soft boot. It refers to when we restart the computer. Here, the
computer does not start from the initial state. When the system gets stuck sometimes it is
required to restart it while it is ON. Therefore, in this condition the warm boot takes place.
Restart button or CTRL+ALT+DELETE keys are used forwarmboot.
Disk And File System
A file system is a process that manages how and where data on a storage disk, typically
a hard disk drive (HDD), is stored, accessed and managed. It is a logical disk component
that manages a disk's internal operations as itrelates to a computer and is abstract to a
human user.
UNIX
UNIX is a family of multitasking, multiuser computer operating systems that derive from
the original AT&T Unix, whose development started in 1969 at the Bell Labs research
center by Ken Thompson, Dennis Ritchie, and others.
Initially intended for use inside the Bell System, AT&T licensed Unix to outside parties in
the late 1970s, leading to a variety of both academic and commercial Unix variants from
vendors including University of California, Berkeley (BSD), Microsoft (Xenix), Sun
Microsystems (SunOS/Solaris), HP/HPE (HP-UX), and IBM (AIX). In the early 1990s, AT&T
sold its rights in Unix to Novell, which then sold its Unix business to the Santa Cruz
Operation (SCO) in 1995.
What is Open Source Software (OSS)
Open source software is softwarewith source code that anyone can inspect, modify, and
enhance.
"Source code" is the part of software that most computer users don't ever see; it's the
code computer programmers can manipulate to change how a piece of software—a
"program" or "application"—works. Programmers who have access to a computer
program's source code can improve that program by adding features to it orfixing parts
that don't alwayswork correctly.
LINUX IDEA
Open-source hardware (OSH)
consists of physical artifacts of technology designed and offered by the open-designmovement. Both
free and open-source software (FOSS) and open-source hardware are created by this open-source
culture movement and apply a like concept to a variety of components.
It is sometimes, thus,referred to as FOSH (free and open-source hardware). The term usually means
that information about the hardware is easily discerned so that others can make it – coupling it closely
to the maker movement.
Hardware design (i.e. mechanical drawings, schematics, bills of material, PCB layout
data, HDL source code and integrated circuit layout data),
List Of All Linux OS Distributions
1.Android
2.Debian GNU/Linux
3.Fedora
4.openSUSE
5.Red Hat Enterprise Linux
6.Slackware Linux
7.SUSE Linux
8.Ubuntu
9.Arch Linux
10.CentOS
11.Gentoo Linux
12.KNOPPIX
13.German
14.Linux Mint
15.Mageia
16. Oracle Linux
17. Scientific Linux
And So Many More OS With IN LINUX
Linux Principles
•Everything is a File : –
UNIX systems have many powerful utilities designed to create and manipulate files. The
UNIX security model is based around the security of files. By treating everything as a file, a
consistency emerges. You can secure access to hardware in the same way as you secure
access to a document.
•Ability to chain programs together to perform complex tasks :-
A core design feature of UNIX is that the output of one program can be the input for
another. This gives the user the flexibility to combine many small programs together to
perform a larger,more complex task.
•Configuration data stored in text : –
Text is a universal interface, and many UNIX utilities exist to manipulate text. Storing
configuration in text allows an administrator to move a configuration from one machine
to another easi
0 Comments