Operating System (OS)

Basics

Classification of OS'es on the basis of usage

<aside> πŸ‘‰ Batch

</aside>

There is no direct interaction b/w the OS and the end-user, instead each user prepares his job on an offline device (punch-cards etc) and submit to the computer operator. Similar jobs are grouped and run together as batches, and fed to the OS by the operator.

<aside> πŸ‘‰ Time Sharing

</aside>

For systems where many users access the common hardware, there could be a need to time share the limited resources

<aside> πŸ‘‰ Network

</aside>

A network OS runs on a server and provides the server capability to manage data, users, groups, security and stuff

<aside> πŸ‘‰ Realtime

</aside>

In cases when we need fine-grained time precision, execution and responsiveness, such as military automated weaponry, robots, air traffic control, ICS etc.

<aside> πŸ‘‰ Distributed

</aside>

For hardware that is distributed physically and a single OS need to coordinate their access and distribute data processing jobs among all those processors, all having their own physical memory, and also ensuring communication b/w processors.

Classification of OS'es on the basis of design and supported features

<aside> πŸ‘‰ Monolithic (Non-Modular) OS

</aside>

<aside> πŸ‘‰ Modular Monolith OS

</aside>

<aside> πŸ‘‰ Microkernel (Microservices Based)

</aside>

What is the need of an Operating System

Consider an application which would play an audio file from the file system and another application that needs to create a file and write to the disk

The Kernel

Basics

Memory resident part of the OS that acts as an interface b/w the hardware and the programs, and these services include:

Runs in a protected area of the memory (kernel-space / ring zero) whereas the user-actions are performed in another part of the memory (user-space / ring-3)

Protection Rings

<aside> πŸ‘‰ What are Protection Rings

</aside>

Virtualization and Protection Rings (Welcome to Ring -1) Part I

Virtualization and Protection Rings (Welcome to Ring -1) Part II

<aside> πŸ‘‰ Kernel Mode (Ring 0)

</aside>

<aside> πŸ‘‰ What happens when a less-privileged program tries to execute privileged instructions

</aside>

If something running in a less-privileged execution mode tries executing privileged instructions, the hardware traps to the OS which is done by redirecting the execution flow through the IVT and the IVT pointing to the OS, once execution flow transfers to the OS, the OS kills the program.