1/23/2004 CSCI 315 Operating Systems Design 1 Computer System Structures Notice: The slides for this lecture have been largely based on those accompanying the textbook Operating Systems Concepts with Java, by Silberschatz, Galvin, and Gagne (2003). Many, if not all, the illustrations contained in this presentation come from this source.
44
Embed
1/23/2004CSCI 315 Operating Systems Design1 Computer System Structures Notice: The slides for this lecture have been largely based on those accompanying.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1/23/2004 CSCI 315 Operating Systems Design 1
Computer System Structures
Notice: The slides for this lecture have been largely based on those accompanying the textbook Operating Systems Concepts with Java, by Silberschatz, Galvin, and Gagne (2003). Many, if not all, the illustrations contained in this presentation come from this source.
1/23/2004 CSCI 315 Operating Systems Design 2
Memory Layout for a Simple Batch System
Operating System
User Program AreaOne programs: it’s loaded, runs to completion, and leaves the system.
1/23/2004 CSCI 315 Operating Systems Design 3
Multiprogrammed Batch Systems
Several jobs are kept in main memory at the same time, and the CPU is multiplexed among them.
Operating System
Job 1
Job 2
Job 3
Job 4
0
512K
1/23/2004 CSCI 315 Operating Systems Design 4
Time-Sharing SystemsInteractive Computing
• The CPU is multiplexed among several jobs that are kept in memory and on disk (the CPU is allocated to a job only if the job is in memory).
• A job swapped in and out of memory to the disk.• On-line communication between the user and the
system is provided:– When the operating system finishes the execution of one
command, it seeks the next “control statement” from the user’s keyboard
• On-line system must be available for users to access data and code.
1/23/2004 CSCI 315 Operating Systems Design 5
Desktop Systems
• Personal computers – computer system dedicated to a single user.
• I/O devices – keyboards, mice, display screens, small printers.
• User convenience and responsiveness.• Can adopt technology developed for larger operating
system: – Often individuals have sole use of computer and do not need
advanced CPU utilization of protection features.
• May run several different types of operating systems (Windows, MacOS, UNIX, Linux).
1/23/2004 CSCI 315 Operating Systems Design 6
Parallel Systems
• Systems with more than one CPU in close communication (also known as multiprocessor systems).
• Tightly coupled system – processors share memory and a clock; communication usually takes place through the shared memory.
• Advantages of parallel system: – Increased throughput– Economical – Increased reliability (in some cases)
• graceful degradation
• fail-soft systems
1/23/2004 CSCI 315 Operating Systems Design 7
Parallel Systems (Cont.)• Asymmetric multiprocessing
– Each processor is assigned a specific task; master processor schedules and allocated work to slave processors.
– More common in extremely large systems.
• Symmetric multiprocessing (SMP)– Each processor runs and identical copy of the operating
system.– Many processes can run at once without performance
deterioration.– Most modern operating systems support SMP.
1/23/2004 CSCI 315 Operating Systems Design 8
Symmetric Multiprocessing Architecture
CPU
Memory
CPU CPU...
1/23/2004 CSCI 315 Operating Systems Design 9
Distributed Systems
• Distribute the computation among several physical processors.
• Loosely coupled system – each processor has its own local memory; processors communicate with one another through various communications lines, such as high-speed buses or telephone lines.
• Advantages of distributed systems:– Resources Sharing, – Computation speed up – load sharing,– Reliability,– Communications.
1/23/2004 CSCI 315 Operating Systems Design 10
Distributed Systems (cont.)
• Requires networking infrastructure.
• Local area networks (LAN) or Wide area networks (WAN).
• May be either client-server or peer-to-peer systems.
1/23/2004 CSCI 315 Operating Systems Design 11
General Structure of Client-Server System
Client
Server
Client Client...
network
1/23/2004 CSCI 315 Operating Systems Design 12
Clustered Systems
• Clustering allows two or more systems to share storage.
• Provides high reliability.
• Asymmetric clustering: one server runs the application or applications while other servers standby.
• Symmetric clustering: all N hosts are running the application or applications.
1/23/2004 CSCI 315 Operating Systems Design 13
Real-Time Systems
• Often used as a control device in a dedicated application such as controlling scientific experiments, medical imaging systems, industrial control systems, and some display systems.
• Well-defined fixed-time constraints.• Real-Time systems may be either hard or soft
real-time.
1/23/2004 CSCI 315 Operating Systems Design 14
Real-Time Systems (Cont.)
• Hard real-time:– Secondary storage limited or absent, data stored in
short term memory, or read-only memory (ROM).– Conflicts with time-sharing systems, not supported
by general-purpose operating systems.
• Soft real-time:– Limited utility in industrial control of robotics.– Integrate-able with time-share systems.– Useful in applications (multimedia, virtual reality)
requiring tight response times.
1/23/2004 CSCI 315 Operating Systems Design 15
Handheld Systems
• Personal Digital Assistants (PDAs).
• Cellular telephones.
• Issues:– Limited memory,– Slow processors,– Small display screens.
1/23/2004 CSCI 315 Operating Systems Design 16
Migration of Operating System Concepts and Features
1/23/2004 CSCI 315 Operating Systems Design 17
Chapter 2: Computer-System Structures
• Computer System Operation
• I/O Structure
• Storage Structure
• Storage Hierarchy
• Hardware Protection
• Network Structure
1/23/2004 CSCI 315 Operating Systems Design 18
A Modern Computer System
CPUDisk
ControllerI/O
Controller
...
Disks Mouse
Keyboard
Printer
Memory Graphics Adapter
Network Interface
Monitor
1/23/2004 CSCI 315 Operating Systems Design 19
Computer-System Operation
• I/O devices and the CPU can execute concurrently.• Each device controller is in charge of a particular device
type.• Each device controller has a local buffer.• CPU moves data from/to main memory to/from local
buffers.• I/O is from the device to local buffer of controller.• Device controller informs CPU that it has finished its
operation by causing an interrupt.
1/23/2004 CSCI 315 Operating Systems Design 20
Common Functions of Interrupts
• Interrupt transfers control to the interrupt service routine generally, through the interrupt vector, which contains the addresses of all the service routines.
• Interrupt architecture must save the address of the interrupted instruction.
• Incoming interrupts are disabled while another interrupt is being processed to prevent a lost interrupt.
• A trap is a software-generated interrupt caused either by an error or a user request.
• An operating system is interrupt driven.
1/23/2004 CSCI 315 Operating Systems Design 21
Interrupt Handling
• The operating system preserves the state of the CPU by storing registers and the program counter.
• Determines which type of interrupt has occurred:– polling,– vectored interrupt system.
• Separate kernel routines determine what action should be taken for each type of interrupt.
1/23/2004 CSCI 315 Operating Systems Design 22
I/O Structure• Synchronous I/O - After I/O starts, control returns to user
program only upon I/O completion:– Wait instruction idles the CPU until the next interrupt,– Wait loop (contention for memory access),– At most one I/O request is outstanding at a time, no
simultaneous I/O processing.
• Asynchronous I/O - After I/O starts, control returns to user program without waiting for I/O completion:– System call – request to the operating system to allow user to
wait for I/O completion,– Device-status table contains entry for each I/O device indicating
its type, address, and state,– Operating system indexes into I/O device table to determine
device status and to modify table entry to include interrupt.
1/23/2004 CSCI 315 Operating Systems Design 23
Two I/O MethodsSynchronous Asynchronous
1/23/2004 CSCI 315 Operating Systems Design 24
DMA Structure
• Used for high-speed I/O devices able to transmit information at close to memory speeds.
• Device controller transfers blocks of data from buffer storage directly to main memory without CPU intervention.
• Only on interrupt is generated per block, rather than the one interrupt per byte.
1/23/2004 CSCI 315 Operating Systems Design 25
Storage Structure• Main memory – only large storage media that the CPU
can access directly.
• Secondary storage – extension of main memory that provides large nonvolatile storage capacity.
• Magnetic disks – rigid metal or glass platters covered with magnetic recording material:– Disk surface is logically divided into tracks, which are subdivided
into sectors,– The disk controller determines the logical interaction between
the device and the computer.
1/23/2004 CSCI 315 Operating Systems Design 26
Moving-Head Disk Mechanism
1/23/2004 CSCI 315 Operating Systems Design 27
Storage Hierarchy
• Storage systems organized in hierarchy:– Speed,– Cost,– Volatility.
• Caching – copying information into faster storage system; main memory can be viewed as a last cache for secondary storage.
1/23/2004 CSCI 315 Operating Systems Design 28
Storage-Device Hierarchy
1/23/2004 CSCI 315 Operating Systems Design 29
Caching
• Use of high-speed memory to hold recently-accessed data.
• Requires a cache management policy.
• Caching introduces another level in storage hierarchy:– This requires data that is simultaneously stored in
more than one level to be consistent.
1/23/2004 CSCI 315 Operating Systems Design 30
From Disk to Register
Consider a system with virtual memory in which an integer variable A has been swapped out of “core” and currently resides on disk. Consider that a machine instruction moves that variable from memory into a register.
Question: What is the sequence of events that ensues until the value of A is finally stored in a register?
1/23/2004 CSCI 315 Operating Systems Design 31
Hardware Protection
• Dual-Mode Operation
• I/O Protection
• Memory Protection
• CPU Protection
1/23/2004 CSCI 315 Operating Systems Design 32
Dual-Mode Operation
• Sharing system resources requires operating system to ensure that an incorrect program or poorly behaving human cannot cause other programs to execute incorrectly.
• OS must provide hardware support to differentiate between at least two modes of operations:1. User mode – execution done on behalf of a user,
2. Monitor mode (also kernel mode or system mode) – execution done on behalf of operating system.
1/23/2004 CSCI 315 Operating Systems Design 33
Dual-Mode Operation (Cont.)
• Mode bit added to computer hardware to indicate the current mode: monitor (0) or user (1).
• When an interrupt or fault occurs hardware switches to monitor mode.
Privileged instructions can be issued only in monitor mode
monitor user
Interrupt/fault
set user mode
1/23/2004 CSCI 315 Operating Systems Design 34
I/O Protection
• All I/O instructions are privileged instructions.
• Must ensure that a user program could never gain control of the computer in monitor mode (i.e., a user program that, as part of its execution, stores a new address in the interrupt vector).
1/23/2004 CSCI 315 Operating Systems Design 35
Use of an I/O System Call
1/23/2004 CSCI 315 Operating Systems Design 36
Memory Protection
• Must provide memory protection at least for the interrupt vector and the interrupt service routines.
• In order to have memory protection, at a minimum add two registers that determine the range of legal addresses a program may access:– Base register – holds the smallest legal physical memory
address,– Limit register – contains the size of the range.
• Memory outside the defined range is protected.
1/23/2004 CSCI 315 Operating Systems Design 37
Base and Limit Registers
1/23/2004 CSCI 315 Operating Systems Design 38
Hardware Address Protection
1/23/2004 CSCI 315 Operating Systems Design 39
Hardware Protection
• When executing in monitor mode, the operating system has unrestricted access to both monitor and user’s memory.
• The load instructions for the base and limit registers are privileged instructions.
1/23/2004 CSCI 315 Operating Systems Design 40
CPU Protection
• Timer – interrupts computer after specified period to ensure operating system maintains control:– Timer is decremented every clock tick– When timer reaches the value 0, an interrupt occurs
• Timer commonly used to implement time sharing.
• Time also used to compute the current time.
• Load-timer is a privileged instruction.
1/23/2004 CSCI 315 Operating Systems Design 41
General-System Architecture
• Given the I/O instructions are privileged, how does the user program perform I/O?
• System call – the method used by a process to request action by the operating system:– Usually takes the form of a trap to a specific location in the
interrupt vector,– Control passes through the interrupt vector to a service routine
in the OS, and the mode bit is set to monitor mode,– The monitor verifies that the parameters are correct and legal,
executes the request, and returns control to the instruction following the system call.