Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
52 views110 pages

Osy Ch2 Notes

The document provides an overview of operating system services and system calls. It discusses: 1) The main services provided by an operating system include program execution, I/O operations, file system manipulation, communication, error handling, resource management, protection, and accounting. 2) System calls provide the interface between user programs and the operating system kernel. They allow programs to request services like accessing files or hardware that are not available in user mode. 3) When a program makes a system call, control switches from user mode to privileged kernel mode. The kernel fulfills the request and then switches back to user mode for the program to continue execution.

Uploaded by

manasikotwal00
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views110 pages

Osy Ch2 Notes

The document provides an overview of operating system services and system calls. It discusses: 1) The main services provided by an operating system include program execution, I/O operations, file system manipulation, communication, error handling, resource management, protection, and accounting. 2) System calls provide the interface between user programs and the operating system kernel. They allow programs to request services like accessing files or hardware that are not available in user mode. 3) When a program makes a system call, control switches from user mode to privileged kernel mode. The kernel fulfills the request and then switches back to user mode for the program to continue execution.

Uploaded by

manasikotwal00
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 110

Operating

System
Chapter 2

MRS A.S.KHANDAGALE

1
2
Operating System
• An Operating System provides services to both the users and to
the programs.
It provides programs an environment to execute.
It provides users the services to execute the programs in a
convenient manner.

3
Fig:-A view of Operating System services 4
Different Sevices of Operating System
Following are a few common services provided by an operating
system −
• Program execution
• I/O operations
• File System manipulation
• Communication
• Error Detection and handling
• Resource Management
• Protection
• Accounting

5
1)Program execution

• Operating systems handle many kinds of activities from user


programs to system programs like printer spooler, name
servers, file server, etc.
• Each of these activities is encapsulated as a process.
• A process includes the complete execution context (code to
execute, data to manipulate, registers, OS resources in use).

6
Following are the major activities of an operating
system with respect to program management −

Loads a program into memory.


Executes the program.
Handles program's execution.
Provides a mechanism for process synchronization.
Provides a mechanism for process communication.
Provides a mechanism for deadlock handling.

7
2) I/O Operation
An I/O subsystem comprises of I/O devices and their corresponding
driver software. Drivers hide the peculiarities of specific hardware
devices from the users.
An Operating System manages the communication between user and
device drivers.
I/O operation means read or write operation with any file or any
specific I/O device.
Operating system provides the access to the required I/O device
when required.

8
3) File system manipulation
• A file represents a collection of related information.
• Computers can store files on the disk (secondary storage), for
long-term storage purpose.
• Examples of storage media include magnetic tape, magnetic
disk and optical disk drives like CD, DVD.
• Each of these media has its own properties like speed, capacity,
data transfer rate and data access methods.
• A file system is normally organized into directories for easy
navigation and usage.
• These directories may contain files and other directions.

9
Following are the major activities of an operating
system with respect to file management −
Program needs to read a file or write a file.
The operating system gives the permission to the program for
operation on file.
Permission varies from read-only, read-write, denied and so on.
Operating System provides an interface to the user to create/delete
files.
Operating System provides an interface to the user to create/delete
directories.
Operating System provides an interface to create the backup of file
system.

10
4) Communication
• In case of distributed systems which are a collection of
processors that do not share memory, peripheral devices, or a
clock, the operating system manages communications between
all the processes.

• Multiple processes communicate with one another through


communication lines in the network.

• The OS handles routing and connection strategies, and the


problems of contention and security.

11
Following are the major activities of an operating system with
respect to communication −
 Two processes often require data to be transferred between them
 Both the processes can be on one computer or on different computers, but are connected
through a computer network.

 Communication may be implemented by two methods, either by Shared Memory or by


Message Passing.

12
13
5) Error Detection and Handling
• Errors can occur anytime and anywhere.
• An error may occur in CPU, in I/O devices or in the memory
hardware.
• Following are the major activities of an operating system with
respect to error handling −
The OS constantly checks for possible errors.
The OS takes an appropriate action to ensure correct and
consistent computing.

14
6)Resource Management
• In case of multi-user or multi-tasking environment, resources
such as main memory, CPU cycles and files storage are to be
allocated to each user or job.
• Following are the major activities of an operating system with
respect to resource management −
The OS manages all kinds of resources using schedulers.
CPU scheduling algorithms are used for better utilization of
CPU.

15
7) Protection
• Considering a computer system having multiple users and concurrent
execution of multiple processes, the various processes must be protected
from each other's activities.
• Protection refers to a mechanism or a way to control the access of
programs, processes, or users to the resources defined by a computer
system.
• Following are the major activities of an operating system with respect to
protection −
The OS ensures that all access to system resources is controlled.
The OS ensures that external I/O devices are protected from invalid
access attempts.
The OS provides authentication features for each user by means of
passwords.

16
8)Accounting

• Operating system keep an account of all the resources


accessed by each process or user.
• In multitasking ,accounting enhances the system performance
with the allocation of resources to each process ensuring
satisfaction to each process.

17
Thank You

18
Operating
System
Chapter 2

MRS A.S.KHANDAGALE

1
Contents
• User and kernel mode
• System call :-Interface between process and kernel(OS)
• Execution of system call.
• Categories of system call:-
1) Process control :-end(),abort(),load(),execute()…..
2)File management:-create(),open(),close(),delete()…
3)Device management:-request(),release,read,write….
4)Information Maintainance:-get set time ,date,system data..
5)Communication:-create,delete communication,send and receive

2
Difference between kernel mode and user mode of a CPU.
Every modern operating system supports these two modes.

3
Kernel Mode
• When CPU is in kernel mode, the code being executed can
access any memory address and any hardware resource.
• Hence kernel mode is a very privileged and powerful mode.
• If a program crashes in kernel mode, the entire system will be
halted.

User Mode
• When CPU is in user mode, the programs don't have direct
access to memory and hardware resources.
• In user mode, if any program crashes, only that particular
program is halted.
• That means the system will be in a safe state even if a program
in user mode crashes.
• Hence, most programs in an OS run in user mode.
4
• System Call
• When a program in user mode requires access to RAM or a
hardware resource, it must ask the kernel to provide access
to that resource. This is done via something called a system
call.
• When a program makes a system call, the mode is switched
from user mode to kernel mode. This is called a context
switch.
• Then the kernel provides the resource which the program
requested. After that, another context switch happens
which results in change of mode from kernel mode back to
user mode. 5
System calls are made by the user level programs in the
following situations:

Creating, opening, closing and deleting files in the file


system.

Creating and managing new processes.

Creating a connection in the network, sending and


receiving packets.

Requesting access to a hardware device, like a mouse or a


printer. 6
System call
The interface between a process and an operating system is
provided by system calls.
System calls are available as assembly language instructions.
System calls are usually made when a process in user mode
requires access to a resource. Then it requests the kernel to provide
the resource via a system call.
Ex.System calls allow user-level processes to request some services
from the operating system which process itself is not allowed to do.
For example, for I/O a process involves a system call telling the
operating system to read or write a particular area and this request is
satisfied by the operating system.

7
A figure representing the execution of the system call is given as follows −

As can be seen from this diagram, the processes execute normally in the user mode until a system call
interrupts this. Then the system call is executed on a priority basis in the kernel mode. After the
execution of the system call, the control returns to the user mode and execution of user processes can
be resumed.
8
9
Types of System Calls
There are mainly five types of system calls. These are explained
in detail as follows −
Process Control
These system calls deal with processes such as process
creation, process termination etc.
A running program needs to be able to stop execution either
normally or abnormally.
When execution is stopped abnormally, often a dump of memory
is taken and can be examined with a debugger.

10
• Functions:
• End and Abort:-A running program needs to halt its execution either
normally(end) or abnormally (abort)
• Load and Execute:- A process or job executing one program may
want to load and execute another program.
• Create Process and Terminate Process:-We also want to terminate a
job or process that we created(terminate process).
• Wait and Signal Event:- If we find that it is incorrect or no longer
needed we may require waiting time to finish execution(wait time).
The processes must signal about occurance of wait event
• Get process attributes and set process attributes are used to get
and set process attributes like process id,priority,staus,created
date and time.

11
File Management
These system calls are responsible for file manipulation such as
creating a file, reading a file, writing into a file etc.
Some common system calls
are create, delete, read, write, reposition, or close.
There is a need to determine the file attributes – get and set file
attribute..

12
Functions:
• Create a file
• Delete file
• Open and close file
• Read, write, and reposition
• Get and set file attributes

13
Create and delete file:-We first need to create and delete files.
Open and close :- Once the file is created, we need to open it and to use it. Finally, we
need to close the file, indicating that we are no longer using it.
Read,Write,Reposition:- Read and write operations perform read and write operations on
a file .By using Reposition a pointer may be set at starting position or can be repositioned
anywhere in a file.
Get and Set file attributes:-
• When any file created or in use much more information gets attached to file by OS like
file name,acess rights,protection code,date and time,accounting information.Thus these
system calls used to set and get file attributes.
• We may need these same sets of operations for directories if we have a directory structure
for organizing files in the file system.
• In addition, for either files or directories, we need to be able to determine the values of
various attributes and perhaps to reset them if necessary. File attributes include the file
name, a file type, protection codes, accounting information, and so on

14
Device Management

These system calls are responsible for device manipulation such as


reading from device buffers, writing into device buffers etc.
Process usually require several resources to execute, if these
resources are available, they will be granted and control returned to
the user process.
Some are physical, such as a video card, and others are abstract,
such as a file.
User programs request the device, and when finished they release the
device. Similar to files, we can read, write, and reposition the device.

15
Functions
• Request and release device
• Logically attach/ detach devices
• Get and Set device attributes

16
• Functions:
request device, release device:-
A process may need several resources to execute - main memory, disk drives, access to
files, and so on. If the resources are available, they can be granted, and control can be
returned to the user process. Otherwise, the process will have to wait until sufficient
resources are available.If the systems has multiple users we must first have to request
the resources and if it is available after finishing our work we must release it.

read, write, reposition:-


Once the device has been requested (and allocated to us), we can read, write, and
(possibly) reposition the device, just as we can with files.

get device attributes, set device attributes:-


These system calls are used to retrieve information like acess permissions,capacity
of the attached devices.
logically attach or detach devices:-
These system calls are similar to open and close system calls of files
17
Information Maintenance
• These system calls handle information and its transfer between the
operating system and the user program.
• The OS also keeps information about all its processes and provides system
calls to report this information. For example, most systems have a system
call to return the current time and date.
• Other system calls may return information about the system, such as the
number of current users, the version number of the OS, the amount of free
memory or disk space, and so on.
• In addition, the OS keeps information about all its processes, and system
calls are used to access this information. Generally, calls are also used to
reset the process information.
18
• get time or date, set time or date
• get system data, set system data
• get and set process, file, or device attributes

19
Communication
These system calls are useful for interprocess communication. They also
deal with creating and deleting a communication connection.
There are two models of interprocess communication, the message-passing
model and the shared memory model.
Message-passing uses a common mailbox to pass messages between
processes.
Shared memory use certain system calls to create and gain access to create
and gain access to regions of memory owned by other processes. The two
processes exchange information by reading and writing in the shared data.

20
create, delete communication connection
 Send, receive messages if message passing model to host name or
process name .From client to server .Shared-memory model create and
gain access to memory regions .
transfer status information .
attach and detach remote devices.
The name of other communicator must be knownbe it another process on
same cpu or process on another computer connected by communication
network.
Each computer in network has host name,such as IP address.
Each process has its own id.so get hostid and get processid System calls
are used.

21
Thank you

22
Operating
System
Chapter 2

MRS A.S.KHANDAGALE

1
2
Contents
• User and kernel mode
• System call :-Interface between process and kernel(OS)
• Execution of system call.
• Categories of system call:-
1) Process control :-end(),abort(),load(),execute()…..
2)File management:-create(),open(),close(),delete()…
3)Device management:-request(),release,read,write….
4)Information Maintainance:-get set time ,date,system data..
5)Communication:-create,delete communication,send and receive

3
Difference between kernel mode and user mode of a CPU.
Every modern operating system supports these two modes.

4
Kernel Mode
• When CPU is in kernel mode, the code being executed can access any
memory address and any hardware resource.
• Hence kernel mode is a very privileged and powerful mode.
• If a program crashes in kernel mode, the entire system will be halted.

User Mode
• When CPU is in user mode, the programs don't have direct access to
memory and hardware resources.
• In user mode, if any program crashes, only that particular program is
halted.
• That means the system will be in a safe state even if a program in user
mode crashes.
• Hence, most programs in an OS run in user mode.

5
• System Call
• When a program in user mode requires access to RAM or a
hardware resource, it must ask the kernel to provide access
to that resource. This is done via something called a system
call.
• When a program makes a system call, the mode is switched
from user mode to kernel mode. This is called a context
switch.
• Then the kernel provides the resource which the program
requested. After that, another context switch happens
which results in change of mode from kernel mode back to
user mode.
6
System calls are made by the user level programs in the
following situations:

Creating, opening, closing and deleting files in the file system.

Creating and managing new processes.

Creating a connection in the network, sending and receiving


packets.

Requesting access to a hardware device, like a mouse or a


printer.
7
System call
The interface between a process and an operating system is
provided by system calls.
System calls are available as assembly language instructions.
System calls are usually made when a process in user mode
requires access to a resource. Then it requests the kernel to provide
the resource via a system call.
Ex.System calls allow user-level processes to request some services
from the operating system which process itself is not allowed to do.
For example, for I/O a process involves a system call telling the
operating system to read or write a particular area and this request is
satisfied by the operating system.

8
A figure representing the execution of the system call is given as follows −

As can be seen from this diagram, the processes execute normally in the user mode until a system call
interrupts this. Then the system call is executed on a priority basis in the kernel mode. After the
execution of the system call, the control returns to the user mode and execution of user processes can
be resumed.
9
10
Types of System Calls
There are mainly five types of system calls. These are explained
in detail as follows −
Process Control
These system calls deal with processes such as process
creation, process termination etc.
A running program needs to be able to stop execution either
normally or abnormally.
When execution is stopped abnormally, often a dump of memory
is taken and can be examined with a debugger.

11
• Functions:
• End and Abort:-A running program needs to halt its execution either
normally(end) or abnormally (abort)
• Load and Execute:- A process or job executing one program may
want to load and execute another program.
• Create Process and Terminate Process:-We also want to terminate a
job or process that we created(terminate process).
• Wait and Signal Event:- If we find that it is incorrect or no longer
needed we may require waiting time to finish execution(wait time).
The processes must signal about occurance of wait event
• Get process attributes and set process attributes are used to get
and set process attributes like process id,priority,staus,created
date and time.

12
File Management
These system calls are responsible for file manipulation such as
creating a file, reading a file, writing into a file etc.
Some common system calls
are create, delete, read, write, reposition, or close.
There is a need to determine the file attributes – get and set file
attribute..

13
Functions:
• Create a file
• Delete file
• Open and close file
• Read, write, and reposition
• Get and set file attributes

14
Create and delete file:-We first need to create and delete files.
Open and close :- Once the file is created, we need to open it and to use it. Finally, we
need to close the file, indicating that we are no longer using it.
Read,Write,Reposition:- Read and write operations perform read and write operations on
a file .By using Reposition a pointer may be set at starting position or can be repositioned
anywhere in a file.
Get and Set file attributes:-
• When any file created or in use much more information gets attached to file by OS like
file name,acess rights,protection code,date and time,accounting information.Thus these
system calls used to set and get file attributes.
• We may need these same sets of operations for directories if we have a directory structure
for organizing files in the file system.
• In addition, for either files or directories, we need to be able to determine the values of
various attributes and perhaps to reset them if necessary. File attributes include the file
name, a file type, protection codes, accounting information, and so on

15
Device Management

These system calls are responsible for device manipulation such as


reading from device buffers, writing into device buffers etc.
Process usually require several resources to execute, if these
resources are available, they will be granted and control returned to
the user process.
Some are physical, such as a video card, and others are abstract,
such as a file.
User programs request the device, and when finished they release the
device. Similar to files, we can read, write, and reposition the device.

16
Functions
• Request and release device
• Logically attach/ detach devices
• Get and Set device attributes

17
• Functions:
request device, release device:-
A process may need several resources to execute - main memory, disk drives, access to
files, and so on. If the resources are available, they can be granted, and control can be
returned to the user process. Otherwise, the process will have to wait until sufficient
resources are available.If the systems has multiple users we must first have to request
the resources and if it is available after finishing our work we must release it.

read, write, reposition:-


Once the device has been requested (and allocated to us), we can read, write, and
(possibly) reposition the device, just as we can with files.

get device attributes, set device attributes:-


These system calls are used to retrieve information like acess permissions,capacity
of the attached devices.
logically attach or detach devices:-
These system calls are similar to open and close system calls of files
18
Information Maintenance
• These system calls handle information and its transfer between the
operating system and the user program.
• The OS also keeps information about all its processes and provides system
calls to report this information. For example, most systems have a system
call to return the current time and date.
• Other system calls may return information about the system, such as the
number of current users, the version number of the OS, the amount of free
memory or disk space, and so on.
• In addition, the OS keeps information about all its processes, and system
calls are used to access this information. Generally, calls are also used to
reset the process information.
19
• get time or date, set time or date
• get system data, set system data
• get and set process, file, or device attributes

20
Communication
These system calls are useful for interprocess communication. They also
deal with creating and deleting a communication connection.
There are two models of interprocess communication, the message-passing
model and the shared memory model.
Message-passing uses a common mailbox to pass messages between
processes.
Shared memory use certain system calls to create and gain access to create
and gain access to regions of memory owned by other processes. The two
processes exchange information by reading and writing in the shared data.

21
create, delete communication connection
 Send, receive messages if message passing model to host name or
process name .From client to server .Shared-memory model create and
gain access to memory regions .
transfer status information .
attach and detach remote devices.
The name of other communicator must be knownbe it another process on
same cpu or process on another computer connected by communication
network.
Each computer in network has host name,such as IP address.
Each process has its own id.so get hostid and get processid System calls
are used.

22
Thank you

23
Operating
System
Chapter 2

MRS A.S.KHANDAGALE

1
Contents
Operating Systems Components
1)Process Management
2) Main memory management
3)Secondary memory management
4)File Management
5)Device Mangement
6)Protection system
7)Network management

2
3
Operating Systems Components
• An operating system is a large and complex system that can only be
created by partitioning into small pieces.

• These pieces should be a well-defined portion of the system, which


carefully defined inputs, outputs, and functions.
• Although Mac, Unix, Linux, Windows, and other OS do not have the
same structure, most of the operating systems share similar OS
system components like File, Process, Memory, I/O device
management.

4
5
1)Process Management
• The process management component is a procedure for managing
the many processes that are running simultaneously on the
operating system. Every software application program has one or
more processes associated with them when they are running.
• For example, when you use a browser like Google Chrome, there is a
process running for that browser program. The OS also has many
processes running, which performing various functions.
• All these processes should be managed by process management,
which keeps processes for running efficiently. It also uses memory
allocated to them and shutting them down when needed.
• The execution of a process must be sequential so, at least one
instruction should be executed on behalf of the process.

6
• A process is a program in execution.
• A time shared user program such as compiler is a process, a word processing
program run by an ideal machine is a process,sending printout to printer is a
process
• A process needs certain resources, including CPU time, memory, files, and I/O
devices, to accomplish its task. These resources are provided when process is
created or allocated while it is running.
• Program is not a process ,a program is passive entity such as contents of file is
stored on disk, where as a process is an active entity with program counter that
specifies the next instruction to execute .
• The execution of process must be sequential.The CPU executes instructions one
after another ,until the process completes.
• System consist of a collection of processes,some of which are operating system
processes and rest are user processes.
• All these processes are executed concurrently
7
• The operating system is responsible for the following
activities in connection with process management.
– Process creation and deletion both user and system
process.
– process suspension and resumption.
– Provision of mechanisms for:
• process synchronization
• process communication
• Providing mechanism for deadlock handling.

8
2)Main-Memory Management

Memory management refers to management of Primary Memory or


Main Memory
Memory is a large array of words or bytes, each with its own address.
Main memory provides a fast storage that can be accessed directly by
the CPU and I/O devices. For a program to be executed, it must in the
main memory. „
Main memory is a volatile storage device. It loses its contents in the
case of system failure. „

9
The operating system is responsible for the following
activities in connections with memory management:
Keep track of which parts of memory are currently being
used and by whom.
In a multiprogramming system, the OS takes a decision
about which process will get Memory and how much.
Decide which processes to load when memory space
becomes available.
Allocate and deallocate memory space as needed:-
• Allocates the memory when a process requests
• It also de-allocates the Memory when a process no longer requires
or has been terminated.

10
3)Secondary-Storage Management

• The most important task of a computer system is to execute programs. These


programs, along with the data, helps you to access, which is in the main memory
during execution.
• Main Memory of the computer is very small to store all data and programs
permanently. The computer system offers secondary storage to back up the main
Memory.
• However, the secondary storage management also works with storage devices, like a
USB flash drive, and CD/DVD drives.
• Each location in storage has an address,the set of all addresses available to a
program is called an address space
Programs like assemblers, compilers, stored on the disk until it is loaded into memory,
and then use the disk as a source and destination for processing.

11
Functions of Secondary storage management in OS:
• Storage allocation
• Free space management
• Disk scheduling

• Because secondary storage is used frequently it must be


used efficiently.

12
4) File Management
• A file is a set of related information which is should define by its
creator. It commonly represents programs, both source and object
forms, and data. Data files can be numeric, alphabetic, or
alphanumeric.
• A file consists of a sequence of bits,bytes,lines or records whose
meanings are defined by its creators.

• A file system is normally organized into directories for easy


navigation and usage. These directories may contain files and
other directions.

13
File Management

• Computers can store information on several different


types of physical media like magtetic tape,magnetic
disk,optical disk.Each of these media has its own
characteristics and physical organization.
• Each medium is controlled by devices which has unique
characteristics like acess speed,capacity,data transfer
rate,acess method.

14
The operating system has the following important given activities
in connections with file management:
• File creation and deletion.
• Directory creation and deletion.
• For manipulating files and directories.
• Mapping files onto secondary storage.
• Backup files on stable storage media.

15
5) I/O Device Management
• One of the important use of an operating system that helps you to
hide the variations of specific hardware devices from the user.

Functions of I/O subsystem management


• It offers buffering, caching and spooling system
• It provides general device driver interface.
• It provides drivers for particular hardware devices.
• I/O helps you to knows the individualities of a specific device.

16
6) Protection System
• Protection refers to a mechanism for controlling access by
programs, processes, or users to both system and user
resources. „
• The protection mechanism must:
– distinguish between authorized and unauthorized usage.
– specify the controls to be imposed.
– provide a means of enforcement.

17
7)Network Management
• Network management is the process of administering and managing
computer networks. It includes performance management, fault analysis,
provisioning of networks, and maintaining the quality of service.
• A distributed system is a collection of computers/processors that never
share their own memory or a clock. In this type of system, all the
processors have their local Memory, and the processors communicate
with each other using different communication lines, like fiber optics or
telephone lines.
• The computers in the network are connected through a communication
network, which can be configured in a number of different ways. With the
help of network management, the network can be fully or partially
connected, which helps users to design routing and connection
strategies that overcome connection and security issues.
18
• Functions of Network management:

• Distributed systems help you to various computing resources in size


and function. They may involve microprocessors, minicomputers,
and many general-purpose computer systems.
• A distributed system also offers the user access to the various
resources the network shares.
• It helps to access shared resources that help computation to speed-
up or offers data availability and reliability.

19
Here, are some other important activities of OS:
The user's program can't execute I/O operations directly. The
operating system should provide some medium to perform this.
OS checks the capability of the program to read, write, create, and
delete files.
OS facilitates an exchange of information between processes
executing on the same or different systems.
OS components help you to makes sure that you get the correct
computing by detecting errors in the CPU and memory hardware.

20
Thank You

21
Operating
System
Chapter 2

MRS A.S.KHANDAGALE

1
2
Contents
• Operating System Tools:- use
1)computer management
2)Device manager
3) Users and groups
4)Local security policy
5)Task Scheduler
6)Task manager
7)Performance monitor 3
Operating System tools
• Computer operating systems monitor their resources constantly.
• Processes are the main resource and monitoring must be done at
process level.
• This information is used by operating systems while they are running
to perform effective memory management, scheduling,
multiprogramming, and many other important decisions.
• There are a large number of operating system and process monitoring
tools available.

4
1)Computer management
• Computer management option can be found within the control
panel of any computer system. One may go to the control panel
from the start menu.
• Within the control panel there is Administrative tool. One of the
administrative tools is computer management.
• On the computer management window, one may find there are
three panes. The left pane will show some functions, and when
one chooses a function from the left pane, the details of the
pane will be available at the pane at the centre, where as the
right section will show the series of action that can be taken.

5
There is Task Scheduler within the system tools, and even the windows event
viewer can be also accessed from the computer management list. One can
also start defragmentation of the disk and disk spaces from here. And in the
performance sector, one can see how the system is performing and that can
be observed for a long period also.

6
Thus computer management is used use to manage a local or
remote computer
The administrative tools in Computer Management are grouped into the following
three categories
System Tools,Storage,Services and Applications
System Tools
Event Viewer
Shared Folders
Local Users and Groups
Performance Logs and Alerts
Device Manager
Storage
Removable Storage
Disk Defragmenter
Disk Management
Services and Applications
Use Services to manage services on local and remote computers. You can start,
stop, pause, resume, or disable a service.

7
2)Device manager
• When an external hardware is connected to the computer, then the device will be shown
at the Device manager tray or administrative window.
• The hardware may be of various types, like the printers, the USB ported devices like pen
drive, a Tablet or a mobile, a Mouse and a Keyboard or even a camera.
• Most of the time the computer detects the driver of the device and installation of the driver
is done instantly and automatically.
• However, there are many devices which are to be installed separately, like the modems or
a networking device. And sometimes the device is to be added manually, from the add
device option in the device manager tool.
• Once the device is shown at the device manager window, then the device can be
configured or even troubleshooting of the device is also applicable.
• One can go to the device manager pane from the tools directly or even can go there via
the control panel.
• At the category view in the control panel, one can find three options to go to the Device
manager window. The options are 'view devices and printers', 'add a device' and 'adjust
commonly used mobility settings'.

8
9
• Thus Device Manager is a Control Panel applet in Microsoft
Windows operating systems.
• It allows users to view and control the hardware attached to the
computer.
• When a piece of hardware is not working, the offending
hardware is highlighted for the user to deal with.
• You can use Device Manager to change hardware
configuration options, manage drivers, disable and enable
hardware, identify conflicts between hardware devices, and
much more.

10
3)Users and groups
• One can easily go to the Users and groups pane from the tools.
• He or she has to go to the control panel and there one may find the tab, 'user
accounts’.
• There a User account can be created and the profile picture or password can be
managed easily.
• One can even have numerous user accounts enabled to operate at different
mode in the computer. Even one can be given an access to the computer by
making the guest account enabled in a password protected computer.
• One user cannot see or access the files or settings of another user until he or she
is set as administrator.
• One administrator alone can have the access to view or manage all other user's
details.
• There is yet another option in Users and groups to function at the same time.
The option is the group profile, where there will be a group id and a group
password, which can be accessed by the entire group.

11
• Thus
• You can use local users and groups to secure and
manage user accounts and groups stored locally on a storage
system. A user is an account that is authenticated on a storage
system. ...
• You can use local users and groups to limit the ability
of users to perform certain actions by assigning them rights and
permissions.

12
4)Local security policy
• One can find the local security under the Administrative tools, which
one may get access from the control panel. This option allows the
administrator to provide access or deny access to some users to
some drive or software on those drives.
• Thus the changes in those software or drives will not be possible for
them, whom the access to change or configure it is given by the
administrator.
• By this end user policy one administrator can allow or disallow any
user on those computers to get an access over few websites or not.
• By these the users can also be restricted to surf freely at their work
place as most of the irrelevant website; basically the irrelevant
websites to the job will not be opened from there.
13
5)Task Scheduler
The Task Scheduler is a tool included
with Windows that allows predefined actions to be
automatically executed whenever a certain set of
conditions is met.

For example, you can schedule a task to run a backup


script every night, or send you an e-mail whenever a
certain system event occurs.

14
Windows can perform a task at a scheduled time and
scheduled date.Not only one time does it work , but windows
can do a particular task scheduled every day at a
particular time or at particular interval.
In windows 7,windows vista or Windows 8,one may find the task
scheduler in an updated version.Thus it makes the windows user
equipped with best scheduler and without support of any other
software.
Thus Task Scheduler is a component of Microsoft Windows that
provides the ability to schedule the launch of programs or scripts at
pre-defined times or after specified time intervals: job scheduling
(task scheduling).

15
The picture below is an example of what the Task Scheduler looks like in Microsoft
Windows 7.

16
Windows-Based Tools
6)Task Manager (taskmgr)
 Task Manager is probably the most well-known tool for monitoring
processes on the Windows operating system. Task Manager was introduced
with Windows NT and provides a fast look into the current system state
 It shows all applications (one or more processes running within a single
application context) and their state, all processes and some of their most
frequently used performance measures, and some general system
performance measurements.
 Newer versions also display networking performance measurements.
 All measurements are made by directly calling functions in the operating
system to retrieve system counters
17
• Task Manager gives users the ability to control the system by affecting
the running process.
• This is the function general computer users typically use Task
Manager for when an application or process enters a "hung" state due
to errors in the code and cannot be exited normally or when a process
is hogging the CPU.
• In addition to ending a process, Task Manager also allows users to
end a process tree killing all threads associated with the selected
process, set a process's priority to reduce or increase its CPU
consumption,

18
7)Performance monitor
Two of Task Manager's tabs present operating system performance data to the user.
The first is the Processes tab, shown in Figure 1
The Processes tab shows the current memory and percentage of CPU usage of every process
running on the computer as well as the total CPU and memory usage of the system.

Figure 1: Task Manager - Processes Tab 19


The second Task Manager tab that presents operating system performance data is,
not surprisingly, the Performance tab, shown in Figure 2. The Performance tab in
Task Manager provides a top level view of the system state in terms of CPU and
memory usage. A short history is shown on a graph, but once again, none of this
data is logged for comprehensive analysis.

Figure 2: Task Manager - Performance Tab 20


Summary

Thus Performance monitoring of operating systems and processes is


essential for debugging processes and systems, effectively manage
system resources, making system decisions, and evaluating and
examining systems.
This information is used by operating systems tools while they are
running to perform effective memory management, scheduling,
multiprogramming, and many other important decisions.

21
Thank You

22
23
Task Manager's data is updated every one second by default, but it can
be changed to one of three preset values or set to only update
manually. It is highly integrated into the operating system, and it is not
designed to log any of its performance measures for performance
analysis or system evaluation
However, it is an invaluable tool in monitoring and adjusting the
processes running on a computer.

24
Performance Monitor (perfmon)
Performance Monitor is the second most common operating system performance
monitoring tool for Windows. Performance Monitor acts as both a real time and log-based
performance monitoring tool for operating systems
Like Task Manager, Performance Monitor measures performance by making system calls
to retrieve system counters, but Performance Monitor makes these calls via a performance
library that also supports logging of the counters. \
Unlike Task Manager, Performance Monitor provides an interface to monitor any
selection of a huge set of system counters on a graph in real time, rather than just the
limited set Task Manager uses.
Counters include things like percentage of processor time, thread count, page fault rate,
memory size, and elapsed time for processes.
Similarly, there are counters that provide state for threads, the processor, the system,
network interfaces, memory, physical disks, and many others.
This level of detailed information available for monitoring from Performance Monitor is
very extensive and makes Performance Monitor ideal for monitoring resource usage and
performance of almost all pieces of a Windows system.

25
• The main window for Performance Monitor, shown in Figure 3, is a graph of all selected
system counters updated in real time at a specified rate. Almost everything on this display
is customizable from whether it is a graph or a histogram to the colors assigned to certain
counters. The current reading and statistical information is displayed for the selected
counter as the graph updates. Only one counter can be selected at a time for displaying
numerical data, but any number of counters can be included on the graph at once.

26

You might also like