OS Theory Concept Map
OS
Theory Concept Map
Operating Systems (OS) are built to
assist the computer in running all programs as efficiently as possible. The OS
is also used to give users the ability to interact with the computer in an
easier way. Computers must have an environment to execute programs in the best
way possible and also manage all of the resources that are available to the
computer in the best possible method. When controlling the programs, it serves
to supervise the user programs and manage the operation and control devices
(Silberschatz, Galvin, & Gagne 1.1). The OS is an essential requirement for
computing in today’s technological world.
Processes go
through several changes in its life cycle. A process is an active set of
instructions that are executing, versus a passive program (Geek 4 Geeks 2023).
Much like the discussion post that we created for this week's topic, the states
of a process are as follows:
- ·
New: The process is ready to be created
and picked up by the OS.
- ·
Ready: The process is ready to run. The
process is preparing to go to the CPU.
- ·
Run: The process is executed by the CPU.
- ·
Wait: Stored in memory, waiting for input,
or until the process is complete.
- ·
Terminate: The process is ended, and the
PCB is deleted.
Single-level directory structures
start with the root directories and follow directly to the files in each
directory. Two-level directories start with the root at the user’s root,
following the subdirectories. The subdirectories will hold the files that were
created only by the user. Tree directories are similar to two-level
directories but allow the user to have directories stored within directories.
See the attached diagram for illustration. Users can navigate the different
directories and files using various input methods.
Protection, in general, refers to
keeping something safe from harm. Computer files are no different and need
protecting, as well, especially when the files and objects contain sensitive
information. Domain access refers to granting different parts of the OS file
system different rights to different users, depending on who needs access to
what information (Baeldung 2023). The Access Matrix that is created for users
allows files to be protected and also lets the system administrator define
rights to specific users. Geeks for Geeks provides a great example of an Access
Matrix:
In this example, Domain 1 can only read files 1 and 3. These users would not be able to access or even see File 2, or have print access. With Read/Write access, the user is able to delete and view the files. In this example, some users may only have print access. This matrix allows for files to be protected, or shared, with users that need access to the information only. However, if all of the access rights are removed from one object, then there is no access that is allowed to that file (Silberschatz,Galvin,& Gagne 13.8).
In general, files would be protected on
this network by
References
Baeldung. (May 17, 2023). Domains
of Protection in OS. Retrieved from https://www.baeldung.com/cs/domains-of-protection-in- os#:~:text=2.,it%20provides%20isolation%20and%20protection.
Dusey, A. (May 3, 2023). States
of a Process in Operating Systems. Geeks for Geeks. Retrieved from https://www.geeksforgeeks.org/states-of-a-process-in-operating-systems/#
Geeks for Geeks. (April 24,
2023). Introduction of Process Management. Geeks for Geeks. Retrieved from https://www.geeksforgeeks.org/introduction-of-process-management/
OS Memory
Management. (February 25, 2019). Zitoc. Retrieved
from http://zitoc.com/os-memory- management/Links
to an external site.
Silberschatz, A., Galvin, P. B.,
& Gagne, G. (2014). Operating system concepts essentials (2nd
ed.). Retrieved from https://redshelf.com/
TutorialsPoint. (2023). Operating
System – Multi-Threading. Retrieved from http://www.tutorialspoint.com/operating_system/os_multi_threading.htm#
Wikipedia. (March 27, 2023). Peterson's
Algorithm. Retrieved from https://en.wikipedia.org/wiki/Peterson%27s_algorithm
Comments
Post a Comment