Posts

Showing posts from April, 2023

Final Project Summary

Image
  Week 5 – Final Project Summary   Joseph Ahumada The University of Arizona Global Campus CPT304: Operating Systems Theory & Design Instructor Bret Konsavage April 17, 2023 What are the fundamental concepts that underlie operating systems?       In today’s World, various types of computer devices are used daily both personally and professionally. While many aspects of these devices change, one component that tends to stay the same is the need for an operating system. As time progresses, the operating system will also move forward and undergo many phases of upgrades. This progression will bring on new ideas, but one that stays the same is the fundamental concepts that underlie operating systems. Many of these concepts are items such as Process Management, Memory Management, Disc Storage, I/O Management, File Directory Structure, Access Matrix, and Protection and Security. This course introduced us to these concepts and guided us as we ...

Reference list

Barnes, R. (2020, January 31).  Critical Section Problem.  Tutorialspoint.com https://www.tutorialspoint.com/critical-section-problem BYJU’s. (n.d.).  Process in Operating System https://byjus.com/gate/process-in-operating-system-notes/ Gaurav, S. (2022, October 5).  File Management in Operating System.  Scaler.com https://www.scaler.com/topics/file-management-in-operating-system/ Joshi, James. (2003). A generalized temporal role based access control model for developing secure systems. ETD Collection for Purdue University. https://www.researchgate.net/publication/27233516_A_generalized_temporal_role_based_access_control_model_for_developing_secure_systems Meador, D. (2020, January 31).  Single-threaded and Multi-threaded Processes.  Tutorialspoint.com https://www.tutorialspoint.com/single-threaded-and-multi-threaded-processes Morales. (2021, December 3).  THE BENEFITS AND RISKS OF LANGUAGE-BASED PROTECTION IN OPERATING SYSTE...

Week 5 - Protection and security

Image
Outline the goals and principles of domain- and language-based protection in a modern computer system, and describe how an access matrix is used to protect specific resources a process can access. (Consider using a matrix representation to illustrate concepts.) Domain and language-based protection are two models in modern computer systems that can provide a more secure configuration with access to specific content. Using these types of models will ensure the protected content will only be accessed by those objects which have been granted authority. Domain-based protection breaks down access by having multiple domains which have their own specific permissions to content. This permission can be set up as read, read/write, or ownership of the content and can grant different types of access across a specific domain. “Domains may be realized in different fashions - as users, or as processes, or as procedures.” (Silberschatz, A. Gagne, G. Galvin, P. 2014). This type of protection can reduce ...

Week 4 - Files, mass storage, and I/O

Image
Outline the objectives and functions of file systems management and the supported operations, including their reliability and performance. The objectives and functions of file system management are to ensure proper organization within the computer’s files system. There are many responsibilities that come with file system management some of which are to create new files, manage existing files, organize various folders, and read many different file types, all while allowing the user full control to create, edit, rename, and delete files at will. These files can be stored on many different devices such as a local hard disk, a removable drive, or on a shared location. In the event of multiple user access, there is also the idea of access control which controls who can access the file and what type of access is required. Many other requirements with file manipulation are the name, identifier, type, location, size, protection, time, date, and user I.D. of each file. There is also the concept...

Week 3 - Memory management

Image
Outline the objectives and functions of memory management in operating systems. As we learned in the first chapter, memory is a key component of any operating system and can range “in size from hundreds of thousands to billions” of bytes. (Silberschatz, A., Galvin, P. B., & Gagne, G. 2014). Whether it is static or dynamic, memory plays a valuable role. Chapter 7 mentions there is various way in which memory is managed. Depending on the design, the management of memory will change for each component type. Those components are items such as hardware, symbolic and physical memory addresses bindings, as well as between logical and physical addresses. Within those concepts, there must be some form of management, so memory sharing is available between processes. Many of the requirements for proper memory management are also dependent on concepts such as the address which is assigned, the limitations in size, contiguous memory allocation which is essentially blocks of memory that are allo...