+ All Categories
Home > Documents > Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer...

Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer...

Date post: 28-Dec-2015
Category:
Upload: roger-porter
View: 222 times
Download: 4 times
Share this document with a friend
Popular Tags:
26
Chapter 11 - Chapter 11 - System Management System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Syste Gina Rue CIS Faculty
Transcript
Page 1: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

Chapter 11 - Chapter 11 - System ManagementSystem Management

Ivy Tech State College Northwest Region 01

CIS106 Microcomputer Operating Systems

Gina RueCIS Faculty

Page 2: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

See Illustration p.245 2

Introduction - Introduction - System ManagementSystem Management

• Four parts of the OSFour parts of the OS– Memory ManagerMemory Manager

– Processor ManagerProcessor Manager

– Device ManagerDevice Manager

– File ManagerFile Manager

• Each part of the OS depends on the Each part of the OS depends on the other partsother parts

Page 3: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

3

Introduction - System Introduction - System ManagementManagement

• OS parts work togetherOS parts work together

• System designer has to consider trade-offs to System designer has to consider trade-offs to improve the system’s efficiencyimprove the system’s efficiency– improve performance of one componentimprove performance of one component

– cost of that improvementcost of that improvement

– how it might affect the performance of the remainder how it might affect the performance of the remainder of the systemof the system

• Some methods are used to monitor & measure Some methods are used to monitor & measure system performance, accounting & securitysystem performance, accounting & security

Page 4: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

4

Evaluating an OSEvaluating an OS

• Every OS is differentEvery OS is different

• Most were originally designed to work Most were originally designed to work with certain hardware or category of with certain hardware or category of computer, and to meet specific goals of computer, and to meet specific goals of the usersthe users– computing environments, multiple systemscomputing environments, multiple systems

– casual users, programmerscasual users, programmers

– response time, throughputresponse time, throughput

Page 5: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

5

Evaluating an OSEvaluating an OS

• To evaluate an OS, we need to understandTo evaluate an OS, we need to understand– design goalsdesign goals

– historyhistory

– how it communicates with usershow it communicates with users

– how resources are managedhow resources are managed

– what trade-offs were made to achieve goalswhat trade-offs were made to achieve goals

• Need to balance its strengths against its Need to balance its strengths against its weaknessesweaknesses

Page 6: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

6

OS Four ComponentsOS Four Components

• Improvements in a system can only be Improvements in a system can only be made after extensive analysis of the needs made after extensive analysis of the needs of the system’s managers & usersof the system’s managers & users

• Making one change, you may be trading Making one change, you may be trading one set of problems for anotherone set of problems for another

• Key to consider the performance of the Key to consider the performance of the entire system and not just individual entire system and not just individual componentscomponents

Page 7: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

7

OS Four ComponentsOS Four Components

• Memory ManagementMemory Management– if you increase memory or change another if you increase memory or change another

memory allocation scheme, you must consider memory allocation scheme, you must consider the actual operating environment the actual operating environment

– there is a trade-off between memory use and there is a trade-off between memory use and CPU overheadCPU overhead

– as memory management algorithms grow as memory management algorithms grow more complex, the CPU overhead increases more complex, the CPU overhead increases and overall performance can sufferand overall performance can suffer

Page 8: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

8

OS Four ComponentsOS Four Components

• Processor ManagementProcessor Management– Let’s say you decide to implement a Let’s say you decide to implement a

multiprogramming system to increase your multiprogramming system to increase your processor’s utilizationprocessor’s utilization

– multiprogramming requires a great deal of multiprogramming requires a great deal of synchronization between the memory and synchronization between the memory and processor managers and I/O devicesprocessor managers and I/O devices

– The trade-off: better use of the CPU vs. increased The trade-off: better use of the CPU vs. increased overhead, slower response time, & decreased overhead, slower response time, & decreased throughputthroughput

Page 9: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

9

OS Four ComponentsOS Four Components• Device ManagementDevice Management

– Several ways to improve I/O device utilizationSeveral ways to improve I/O device utilization• Blocking reduces the number of physical I/O requestsBlocking reduces the number of physical I/O requests

• Buffering helps the CPU match the slower speed of Buffering helps the CPU match the slower speed of I/O devicesI/O devices

• Rescheduling I/O requests can help optimize I/O timesRescheduling I/O requests can help optimize I/O times

– These are trade-offs: each of these options These are trade-offs: each of these options also increases CPU overhead and uses also increases CPU overhead and uses additional memory spaceadditional memory space

Page 10: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

10

OS Four ComponentsOS Four Components

• File ManagementFile Management– looks at how secondary storage allocation schemes looks at how secondary storage allocation schemes

help the user organize and access files on the help the user organize and access files on the systemsystem

– affects overall system performanceaffects overall system performance

– closely related to the device on which the files are closely related to the device on which the files are storedstored

– different schemes offer different flexibility, but different schemes offer different flexibility, but trade-off for increased file flexibility is increased trade-off for increased file flexibility is increased CPU overheadCPU overhead

Page 11: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

11

Measuring System Measuring System PerformancePerformance

• Total System Performance - “Total System Performance - “the efficiency the efficiency with which a computer system meets its with which a computer system meets its goals” - how well it serves it usersgoals” - how well it serves it users

• A system’s efficiency is affected by 3 major A system’s efficiency is affected by 3 major components:components:– the user’s programsthe user’s programs

– operating system programsoperating system programs

– hardware unitshardware units

Page 12: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

12

Measuring System Measuring System PerformancePerformance

• Measurement ToolsMeasurement Tools– throughputthroughput

– capacitycapacity

– response timeresponse time

– turnaround timeturnaround time

– resource utilizationresource utilization

– availability: MTBF & MTTRavailability: MTBF & MTTR

– reliabilityreliability

Page 13: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

13

Measuring System Measuring System PerformancePerformance

• Feedback loopsFeedback loops– to prevent the processor from spending more time doing to prevent the processor from spending more time doing

overhead then executing jobs, the OS must continuously overhead then executing jobs, the OS must continuously monitor the system and feed this information to the Job monitor the system and feed this information to the Job SchedulerScheduler

– negative feedback loopnegative feedback loop

when system becomes too congested, signals the appropriate when system becomes too congested, signals the appropriate manager to slow down the arrival of the processesmanager to slow down the arrival of the processes

– positive feedback looppositive feedback loop

when the system becomes underutilized, causes the arrival when the system becomes underutilized, causes the arrival rate to increaserate to increase

Page 14: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

14

Measuring System Measuring System PerformancePerformance

• MonitoringMonitoring

– System measurements must include hardware units, System measurements must include hardware units, OS, compilers, and other system softwareOS, compilers, and other system software

– Benchmarks are used to objectively measure and Benchmarks are used to objectively measure and evaluate a system’s performance by running a set of evaluate a system’s performance by running a set of jobs representative of work normally done by the jobs representative of work normally done by the systemsystem

– Benchmarks are useful when comparing systems that Benchmarks are useful when comparing systems that gone through extensive changes or by vendors to gone through extensive changes or by vendors to demonstrate advantages of new system componentsdemonstrate advantages of new system components

Page 15: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

15

AccountingAccounting

• Accounting functions - pay the bills and Accounting functions - pay the bills and keeps the system financially operablekeeps the system financially operable

• Multi-user environment, the OS must be Multi-user environment, the OS must be able to:able to:– set up user accountsset up user accounts

– assign passwordsassign passwords

– identify resources available to each useridentify resources available to each user

– define quotas for available resourcesdefine quotas for available resources

Page 16: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

16

AccountingAccounting• Pricing policies measurementsPricing policies measurements

– total amount of timetotal amount of time

– CPU timeCPU time

– main memory usagemain memory usage

– secondary storage used during program execution or during secondary storage used during program execution or during billing periodbilling period

– use of system softwareuse of system software

– number of I/O operations & time spent waiting for I/O number of I/O operations & time spent waiting for I/O completioncompletion

– Number of input records read, number of output records printedNumber of input records read, number of output records printed

– number of page faultsnumber of page faults

Page 17: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

17

AccountingAccountingMaintaining billing records on-lineMaintaining billing records on-line

• AdvantageAdvantage– status of each user can be checked before the user’s status of each user can be checked before the user’s

job is allowed to enter the READY queuejob is allowed to enter the READY queue

• DisadvantageDisadvantage– overhead, an accounting program is kept active, overhead, an accounting program is kept active,

memory space is used and CPU processing is increasedmemory space is used and CPU processing is increased

– one compromise is to defer the accounting program one compromise is to defer the accounting program until off-hours until off-hours

Page 18: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

18

EthicsEthics

• Cannot be ignored by users or system Cannot be ignored by users or system administratorsadministrators

• Organizations should have published policies Organizations should have published policies clearly stating which actions will or will not be clearly stating which actions will or will not be condonedcondoned– individual needs for privacyindividual needs for privacy

– organization’s need to protect proprietary informationorganization’s need to protect proprietary information

– public’s right to know as illustrated in freedom of public’s right to know as illustrated in freedom of information lawsinformation laws

Page 19: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

19

EthicsEthics

• Ethical lapses by authorized or Ethical lapses by authorized or unauthorized users can have severe unauthorized users can have severe consequencesconsequences– illegally copied softwareillegally copied software

– plagiarismplagiarism

– eavesdropping on emaileavesdropping on email

– hackinghacking

– unethical use of technologyunethical use of technology

Page 20: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

20

System SecuritySystem Security

– The system has conflicting needs:The system has conflicting needs:• to share resourcesto share resources

• to protect resourcesto protect resources

– With the advent of data With the advent of data communication, networking, modern communication, networking, modern telecommunications software, telecommunications software, computer security has become much computer security has become much more difficultmore difficult

Page 21: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

21

System SecuritySystem Security– System VulnerabilitiesSystem Vulnerabilities

•accidental incomplete modification of dataaccidental incomplete modification of data

•data values are incorrectly encodeddata values are incorrectly encoded

• intentional unauthorized accessintentional unauthorized access

•wire tappingwire tapping

•repeated trialsrepeated trials

•trash collectiontrash collection

•trap doorstrap doors

Page 22: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

22

System SecuritySystem Security– System Assaults: Computer VirusesSystem Assaults: Computer Viruses

•A virus is any unauthorized program that is A virus is any unauthorized program that is designed to: designed to:

– gain access to a computer systemgain access to a computer system– lodge itself in a secretive way by incorporating itself lodge itself in a secretive way by incorporating itself

into other legitimate programsinto other legitimate programs– replace itselfreplace itself

•viruses need other programs to spreadviruses need other programs to spread– wormworm– Trojan horseTrojan horse– logic bomblogic bomb– ““pirated” softwarepirated” software

Page 23: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

23

System SecuritySystem Security– System Assaults: Computer VirusesSystem Assaults: Computer Viruses

•Software to combat viruses can be Software to combat viruses can be purchased to protect against virusespurchased to protect against viruses

•most extreme protection for sensitive most extreme protection for sensitive data is encryptiondata is encryption

– putting data into secret codeputting data into secret code

•disadvantages to encryptiondisadvantages to encryption– increase the system’s overheadincrease the system’s overhead– the system becomes totally dependent on the the system becomes totally dependent on the

encryption process itselfencryption process itself

Page 24: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

24

System SecuritySystem Security– Managing SystemsManaging Systems

•most systems use a combination most systems use a combination of several protection devicesof several protection devices

– passwordspasswords– backupsbackups– maintenance of written security maintenance of written security

policiespolicies– training users in proper data training users in proper data

managementmanagement

Page 25: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

25

SummarySummary

• OS is the orchestrated cooperation of every OS is the orchestrated cooperation of every piece of hardware and softwarepiece of hardware and software

• Trade-offs must be made for optimal Trade-offs must be made for optimal performanceperformance

• Appropriate measurement tools and Appropriate measurement tools and techniques are used to verify effectiveness techniques are used to verify effectiveness of the system before & after modifications of the system before & after modifications & then evaluate degree of improvement& then evaluate degree of improvement

Page 26: Chapter 11 - System Management Ivy Tech State College Northwest Region 01 CIS106 Microcomputer Operating Systems Gina Rue CIS Faculty.

26

SummarySummary

• Important to keep system secureImportant to keep system secure

• System is only as good as the System is only as good as the integrity of the data that’s stored on integrity of the data that’s stored on itit

• Prevention is the best form of Prevention is the best form of system securitysystem security


Recommended