SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Unix Operating System Overview
Mrs.Sowmya Jyothi
Faculty
Mangalore
Introduction
 Unix is a multitasking, multiuser computer operating
system developed in 1969 at AT&T(American Telephone
& Telegraph Company) Bell Labs by Ken Thompson,
Dennis Ritchie and others.
 Several people can use a Unix computer at the same
time; hence Unix is called a multiuser system. A user can
also run multiple programs at the same time; hence
Unix is a multitasking environment.
 There are various Unix variants available in the
market. Solaris Unix, AIX, HP Unix and BSD are a few
examples. Linux is also a flavor of Unix which is freely
available.
Unix Introduction
In the mid of 1965, a joint venture was undertaken by Bell
laboratories, General Electric Company and Massachusetts Institute
of Technology(MIT) to develop an operating system that could serve
a large community of users and allowed them to share data.
That OS was called as MULTICS(MULTiplexed Information of
Computing Service).
Some of the Bell Labs programmers who had worked on this project,
Dennis Ritchie, Ken Thompson, Rudd Canaday, Joe Ossanna and Doug
McIlroy designed and implemented the first multi-user operating
system on PDP-7 computers.
Brain W.Kernighan, who was connected with MULTICS, named this
OS as UNIX(UNIplexed information of computing service).
In 1971, this UNIX was ported to the PDP-11 computers.
But this version was not easy to port on new machines,
because all it’s coding were machine dependent.
To resolve this problem, Ken Thompson created a new
high-level language called “B” and rewritten the whole
UNIX code in this high-level language.
This language lacked in several features, so, Dennis Ritchie
shifted the inadequateness of B and modified it to a new
high-level language called “C”.
Finally, the UNIX is written in this “C” language to stand
tall on any machine.
Features of the Unix System
1. The system is written in a high-level language, making
it easy to read, understand, change and move to other
machines.
2. It has a simple user interface that has the power to
provide services that users want.
3. It provides primitives that permit complex programs
to be built from simpler programs
4. It uses hierarchical file system that allows easy
maintenance and efficient implementation
5. It uses a consistent format for files, making application
programs easier to write.
6. It provides a simple, consistent interface to peripheral
devices
7. It hides the machine architecture from the user,
making it easier to write programs that run on different
hardware implementations.
Operating system Services:-
1.Controlling the execution of processes by allowing their creation,
termination or suspension and communication.
2. Scheduling processes fairly for executing on the CPU. Processes
share the CPU in a time-shared manner. The CPU executes a
process, the kernel suspends it when its time quantum elapses, and
the kernel schedules another process to execute. The kernel later
reschedules the suspended process.
3. Allocating main memory for an executing process. If the system
runs low on free memory, the kernel frees memory by writing a
process temporarily to secondary memory, called a swap device. If
the kernel writes entire processes to a swap device, the
implementation of the UNIX system is called a swapping system; if
it writes pages of memory to a swap device, it is called a paging
system.
4. Allocating secondary memory for efficient storage and retrieval
of user data.
5. Allowing processes controlled access to peripheral devices such
as terminals, disk drives, tape drives and network devices.
Unix System Structure-High Level architecture
The UNIX operating system is made up of three parts; the kernel, the shell and
the programs.
The Unix system is viewed as a set of layers.
Layer-1: Hardware –
It consists of all hardware related information.
Layer-2: Kernel, the OS is commonly called the System kernel, or
Kernel. It interacts with hardware and performs most of the tasks
like memory management, task scheduling, and management
are done by the kernel. OS interacts directly with the hardware,
providing common services to programs.
Layer-3: Shell commands –
Shell is the utility that processes users requests. When you
type in a command at the terminal, the shell interprets the
command and calls the program that you want. There are various
commands like cp, mv, cat, grep, id, wc, nroff, a.out and more.
Layer-4: Application Layer –
It is the outermost layer that executes the given external
applications.
1. The hardware at the center of the diagram provides the OS with
basic services.
2. The OS interacts directly with the hardware, providing common
services to programs.
3. Viewing the system as a set of layers, the OS is commonly called the
System kernel, or Kernel.
4. Programs such as the shell and editors(ed and vi) shown in the outer
layers interact with the kernel by invoking a well defined set of
system calls. Shell is a software that lets users interact with the
operating system, usually by typing at a command line. Shell acts
like a command line interpreter. The system calls instruct the kernel
to do various operations for the calling program and exchange data
between the kernel and the program.
5. Other application programs can be built on top of lower-level
programs, hence the existence of the outermost layer in the figure.
For example, the standard C compiler, cc, is in the outermost layer in
the figure.
The Users Perspective
The Unix File System:-
The Unix file system is characterized by
1. A hierarchical structure
2. Consistent treatment of file data
3. The ability to create and delete files
4. Dynamic growth of files
5. Protection of file data
6. The treatment of peripheral devices as files
The unix file system is organized as a tree with a single
root node called root (written “/”), every non-leaf node
of the file system structure is a directory of files, and files
at the leaf nodes of the tree are either directories,
regular files or special directory files.
The name of the file is given by the path name that
describes how to locate the file in the file system
hierarchy.
A path name is a sequence of component names
separated by slash characters; a component is a sequence
of characters that designates a file name that is uniquely
contained in the previous (directory) component.
A full pathname starts with a slash character and specifies
a file that can be found by starting at the file system root
and traversing the file tree, following the branches that
lead to successive component names of the path name.
Relative pathname - A path name does not have to start
from root but can be designated relative to the current
directory.
Permission to access a file is controlled by access
permissions associated with the file. Access permissions
can be set independently to control read, write and
execute permission for 3 classes of users: the file owner,
a file group and others.
Sample File System Tree
Processing Environment:-
Everything in UNIX is either a file or a process.
A process is an executing program identified by a unique PID (process
identifier). A file is a collection of data. They are created by users using
text editors, running compilers etc. Examples of files: a document
(report, essay etc.)
The text of a program written in some high-level programming language
a directory, containing information about its contents, which may be a
mixture of other directories (subdirectories) and ordinary files.
A program is an executable file, and a process is an instance of the
program in execution.
Many processes can execute simultaneously on UNIX systems with no
logical limit to their number, and many instances of a program can exist
simultaneously in the system. Various system calls allow processes to
create new processes, terminate processes, synchronize stages of
process creation and control reaction to various events.
The system calls allow users to write programs that do
sophisticated operations. The shell is a command line
interpreter program that users typically execute after
logging into the system.
The shell allows 3 types of commands.
First, a command can be an executable file that contains
object code produced by compilation of source code.
Second, a command can be an executable file that
contains a sequence of shell command lines.
Finally, a command can be an internal shell command.
Assumptions about the hardware:
The difference between the 2 modes are:-
Processes in user mode can access their own instructions and
data but not kernel instructions and data. Processes in kernel
mode, however can access kernel and user addresses.
Some machine instructions are privileged and results in an
error when executed in user mode.
Although the system executes in one of 2 modes, the kernel
runs on behalf of a user process. The kernel is not a separate
set of processes that run in parallel to user processes, but it is
part of each user process.
References:
The design of the Unix operating system by
Maurice J. Bach

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Linux basics
Linux basicsLinux basics
Linux basics
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
 
UNIX Operating System
UNIX Operating SystemUNIX Operating System
UNIX Operating System
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
 
File System Interface
File System InterfaceFile System Interface
File System Interface
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
operating system structure
operating system structureoperating system structure
operating system structure
 
File System Hierarchy
File System HierarchyFile System Hierarchy
File System Hierarchy
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Process management in linux
Process management in linuxProcess management in linux
Process management in linux
 
File system Os
File system OsFile system Os
File system Os
 
Linux
Linux Linux
Linux
 
Linux
Linux Linux
Linux
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
 
Operating system basics
Operating system basicsOperating system basics
Operating system basics
 
Unix ppt
Unix pptUnix ppt
Unix ppt
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
 

Ähnlich wie Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi

UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in LinuxDr.YNM
 
LinuxOS-1 (1).ppt
LinuxOS-1 (1).pptLinuxOS-1 (1).ppt
LinuxOS-1 (1).pptSavitha74
 
UNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-IUNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-IJK Knowledge
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure amol_chavan
 
Introduction to unix (1).pptx
Introduction to unix (1).pptxIntroduction to unix (1).pptx
Introduction to unix (1).pptxvirat834293
 
Architecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxArchitecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxVivekGupta920049
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxMahiDivya
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment pptRama .
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptxHarsha Patel
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptxHarsha Patel
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrationshaile468688
 
Introduction to System Programming
Introduction to System ProgrammingIntroduction to System Programming
Introduction to System ProgrammingSayed Chhattan Shah
 

Ähnlich wie Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi (20)

UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
 
LinuxOS-1 (1).ppt
LinuxOS-1 (1).pptLinuxOS-1 (1).ppt
LinuxOS-1 (1).ppt
 
UNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-IUNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-I
 
UNIX_module1.pptx
UNIX_module1.pptxUNIX_module1.pptx
UNIX_module1.pptx
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
Introduction to unix (1).pptx
Introduction to unix (1).pptxIntroduction to unix (1).pptx
Introduction to unix (1).pptx
 
Presentation1.pdf
Presentation1.pdfPresentation1.pdf
Presentation1.pdf
 
Spsl unit1
Spsl   unit1Spsl   unit1
Spsl unit1
 
UNIX_Module 1.pdf
UNIX_Module 1.pdfUNIX_Module 1.pdf
UNIX_Module 1.pdf
 
App A
App AApp A
App A
 
Architecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxArchitecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docx
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptx
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
 
Introduction to unix
Introduction to unixIntroduction to unix
Introduction to unix
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptx
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptx
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 
3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf
 
Studies
StudiesStudies
Studies
 
Introduction to System Programming
Introduction to System ProgrammingIntroduction to System Programming
Introduction to System Programming
 

Mehr von Sowmya Jyothi

Stacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURESStacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURESSowmya Jyothi
 
Functions in c mrs.sowmya jyothi
Functions in c mrs.sowmya jyothiFunctions in c mrs.sowmya jyothi
Functions in c mrs.sowmya jyothiSowmya Jyothi
 
Strings in c mrs.sowmya jyothi
Strings in c mrs.sowmya jyothiStrings in c mrs.sowmya jyothi
Strings in c mrs.sowmya jyothiSowmya Jyothi
 
Arrays in c unit iii chapter 1 mrs.sowmya jyothi
Arrays in c unit iii chapter 1 mrs.sowmya jyothiArrays in c unit iii chapter 1 mrs.sowmya jyothi
Arrays in c unit iii chapter 1 mrs.sowmya jyothiSowmya Jyothi
 
Bca data structures linked list mrs.sowmya jyothi
Bca data structures linked list mrs.sowmya jyothiBca data structures linked list mrs.sowmya jyothi
Bca data structures linked list mrs.sowmya jyothiSowmya Jyothi
 
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHIBCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHISowmya Jyothi
 
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHIBCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHISowmya Jyothi
 
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHIBCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHISowmya Jyothi
 
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHIBCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHISowmya Jyothi
 
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...Sowmya Jyothi
 
Unit II chapter 4 Loops in C
Unit II chapter 4 Loops in CUnit II chapter 4 Loops in C
Unit II chapter 4 Loops in CSowmya Jyothi
 
Unit ii chapter 2 Decision making and Branching in C
Unit ii chapter 2 Decision making and Branching in CUnit ii chapter 2 Decision making and Branching in C
Unit ii chapter 2 Decision making and Branching in CSowmya Jyothi
 
Unit ii chapter 1 operator and expressions in c
Unit ii chapter 1 operator and expressions in cUnit ii chapter 1 operator and expressions in c
Unit ii chapter 1 operator and expressions in cSowmya Jyothi
 
Overview of C Mrs Sowmya Jyothi
Overview of C Mrs Sowmya JyothiOverview of C Mrs Sowmya Jyothi
Overview of C Mrs Sowmya JyothiSowmya Jyothi
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHISowmya Jyothi
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHISowmya Jyothi
 
Introduction to graphics
Introduction to graphicsIntroduction to graphics
Introduction to graphicsSowmya Jyothi
 
Inter Process Communication PPT
Inter Process Communication PPTInter Process Communication PPT
Inter Process Communication PPTSowmya Jyothi
 
Internal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya JyothiInternal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya JyothiSowmya Jyothi
 
Buffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiBuffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiSowmya Jyothi
 

Mehr von Sowmya Jyothi (20)

Stacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURESStacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURES
 
Functions in c mrs.sowmya jyothi
Functions in c mrs.sowmya jyothiFunctions in c mrs.sowmya jyothi
Functions in c mrs.sowmya jyothi
 
Strings in c mrs.sowmya jyothi
Strings in c mrs.sowmya jyothiStrings in c mrs.sowmya jyothi
Strings in c mrs.sowmya jyothi
 
Arrays in c unit iii chapter 1 mrs.sowmya jyothi
Arrays in c unit iii chapter 1 mrs.sowmya jyothiArrays in c unit iii chapter 1 mrs.sowmya jyothi
Arrays in c unit iii chapter 1 mrs.sowmya jyothi
 
Bca data structures linked list mrs.sowmya jyothi
Bca data structures linked list mrs.sowmya jyothiBca data structures linked list mrs.sowmya jyothi
Bca data structures linked list mrs.sowmya jyothi
 
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHIBCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES LINEAR ARRAYS MRS.SOWMYA JYOTHI
 
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHIBCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
BCA DATA STRUCTURES SEARCHING AND SORTING MRS.SOWMYA JYOTHI
 
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHIBCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
 
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHIBCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
BCA DATA STRUCTURES INTRODUCTION AND OVERVIEW SOWMYA JYOTHI
 
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
 
Unit II chapter 4 Loops in C
Unit II chapter 4 Loops in CUnit II chapter 4 Loops in C
Unit II chapter 4 Loops in C
 
Unit ii chapter 2 Decision making and Branching in C
Unit ii chapter 2 Decision making and Branching in CUnit ii chapter 2 Decision making and Branching in C
Unit ii chapter 2 Decision making and Branching in C
 
Unit ii chapter 1 operator and expressions in c
Unit ii chapter 1 operator and expressions in cUnit ii chapter 1 operator and expressions in c
Unit ii chapter 1 operator and expressions in c
 
Overview of C Mrs Sowmya Jyothi
Overview of C Mrs Sowmya JyothiOverview of C Mrs Sowmya Jyothi
Overview of C Mrs Sowmya Jyothi
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
Introduction to graphics
Introduction to graphicsIntroduction to graphics
Introduction to graphics
 
Inter Process Communication PPT
Inter Process Communication PPTInter Process Communication PPT
Inter Process Communication PPT
 
Internal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya JyothiInternal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya Jyothi
 
Buffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiBuffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya Jyothi
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Kürzlich hochgeladen (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi

  • 1. Unix Operating System Overview Mrs.Sowmya Jyothi Faculty Mangalore
  • 2. Introduction  Unix is a multitasking, multiuser computer operating system developed in 1969 at AT&T(American Telephone & Telegraph Company) Bell Labs by Ken Thompson, Dennis Ritchie and others.  Several people can use a Unix computer at the same time; hence Unix is called a multiuser system. A user can also run multiple programs at the same time; hence Unix is a multitasking environment.  There are various Unix variants available in the market. Solaris Unix, AIX, HP Unix and BSD are a few examples. Linux is also a flavor of Unix which is freely available.
  • 3. Unix Introduction In the mid of 1965, a joint venture was undertaken by Bell laboratories, General Electric Company and Massachusetts Institute of Technology(MIT) to develop an operating system that could serve a large community of users and allowed them to share data. That OS was called as MULTICS(MULTiplexed Information of Computing Service). Some of the Bell Labs programmers who had worked on this project, Dennis Ritchie, Ken Thompson, Rudd Canaday, Joe Ossanna and Doug McIlroy designed and implemented the first multi-user operating system on PDP-7 computers. Brain W.Kernighan, who was connected with MULTICS, named this OS as UNIX(UNIplexed information of computing service).
  • 4. In 1971, this UNIX was ported to the PDP-11 computers. But this version was not easy to port on new machines, because all it’s coding were machine dependent. To resolve this problem, Ken Thompson created a new high-level language called “B” and rewritten the whole UNIX code in this high-level language. This language lacked in several features, so, Dennis Ritchie shifted the inadequateness of B and modified it to a new high-level language called “C”. Finally, the UNIX is written in this “C” language to stand tall on any machine.
  • 5. Features of the Unix System 1. The system is written in a high-level language, making it easy to read, understand, change and move to other machines. 2. It has a simple user interface that has the power to provide services that users want. 3. It provides primitives that permit complex programs to be built from simpler programs 4. It uses hierarchical file system that allows easy maintenance and efficient implementation 5. It uses a consistent format for files, making application programs easier to write. 6. It provides a simple, consistent interface to peripheral devices 7. It hides the machine architecture from the user, making it easier to write programs that run on different hardware implementations.
  • 6. Operating system Services:- 1.Controlling the execution of processes by allowing their creation, termination or suspension and communication. 2. Scheduling processes fairly for executing on the CPU. Processes share the CPU in a time-shared manner. The CPU executes a process, the kernel suspends it when its time quantum elapses, and the kernel schedules another process to execute. The kernel later reschedules the suspended process. 3. Allocating main memory for an executing process. If the system runs low on free memory, the kernel frees memory by writing a process temporarily to secondary memory, called a swap device. If the kernel writes entire processes to a swap device, the implementation of the UNIX system is called a swapping system; if it writes pages of memory to a swap device, it is called a paging system. 4. Allocating secondary memory for efficient storage and retrieval of user data. 5. Allowing processes controlled access to peripheral devices such as terminals, disk drives, tape drives and network devices.
  • 7. Unix System Structure-High Level architecture The UNIX operating system is made up of three parts; the kernel, the shell and the programs.
  • 8. The Unix system is viewed as a set of layers. Layer-1: Hardware – It consists of all hardware related information. Layer-2: Kernel, the OS is commonly called the System kernel, or Kernel. It interacts with hardware and performs most of the tasks like memory management, task scheduling, and management are done by the kernel. OS interacts directly with the hardware, providing common services to programs. Layer-3: Shell commands – Shell is the utility that processes users requests. When you type in a command at the terminal, the shell interprets the command and calls the program that you want. There are various commands like cp, mv, cat, grep, id, wc, nroff, a.out and more. Layer-4: Application Layer – It is the outermost layer that executes the given external applications.
  • 9. 1. The hardware at the center of the diagram provides the OS with basic services. 2. The OS interacts directly with the hardware, providing common services to programs. 3. Viewing the system as a set of layers, the OS is commonly called the System kernel, or Kernel. 4. Programs such as the shell and editors(ed and vi) shown in the outer layers interact with the kernel by invoking a well defined set of system calls. Shell is a software that lets users interact with the operating system, usually by typing at a command line. Shell acts like a command line interpreter. The system calls instruct the kernel to do various operations for the calling program and exchange data between the kernel and the program. 5. Other application programs can be built on top of lower-level programs, hence the existence of the outermost layer in the figure. For example, the standard C compiler, cc, is in the outermost layer in the figure.
  • 10. The Users Perspective The Unix File System:- The Unix file system is characterized by 1. A hierarchical structure 2. Consistent treatment of file data 3. The ability to create and delete files 4. Dynamic growth of files 5. Protection of file data 6. The treatment of peripheral devices as files
  • 11. The unix file system is organized as a tree with a single root node called root (written “/”), every non-leaf node of the file system structure is a directory of files, and files at the leaf nodes of the tree are either directories, regular files or special directory files. The name of the file is given by the path name that describes how to locate the file in the file system hierarchy. A path name is a sequence of component names separated by slash characters; a component is a sequence of characters that designates a file name that is uniquely contained in the previous (directory) component.
  • 12. A full pathname starts with a slash character and specifies a file that can be found by starting at the file system root and traversing the file tree, following the branches that lead to successive component names of the path name. Relative pathname - A path name does not have to start from root but can be designated relative to the current directory. Permission to access a file is controlled by access permissions associated with the file. Access permissions can be set independently to control read, write and execute permission for 3 classes of users: the file owner, a file group and others.
  • 14. Processing Environment:- Everything in UNIX is either a file or a process. A process is an executing program identified by a unique PID (process identifier). A file is a collection of data. They are created by users using text editors, running compilers etc. Examples of files: a document (report, essay etc.) The text of a program written in some high-level programming language a directory, containing information about its contents, which may be a mixture of other directories (subdirectories) and ordinary files. A program is an executable file, and a process is an instance of the program in execution. Many processes can execute simultaneously on UNIX systems with no logical limit to their number, and many instances of a program can exist simultaneously in the system. Various system calls allow processes to create new processes, terminate processes, synchronize stages of process creation and control reaction to various events.
  • 15. The system calls allow users to write programs that do sophisticated operations. The shell is a command line interpreter program that users typically execute after logging into the system. The shell allows 3 types of commands. First, a command can be an executable file that contains object code produced by compilation of source code. Second, a command can be an executable file that contains a sequence of shell command lines. Finally, a command can be an internal shell command.
  • 16. Assumptions about the hardware: The difference between the 2 modes are:- Processes in user mode can access their own instructions and data but not kernel instructions and data. Processes in kernel mode, however can access kernel and user addresses. Some machine instructions are privileged and results in an error when executed in user mode. Although the system executes in one of 2 modes, the kernel runs on behalf of a user process. The kernel is not a separate set of processes that run in parallel to user processes, but it is part of each user process.
  • 17. References: The design of the Unix operating system by Maurice J. Bach