IT Essentials - Chapter 4

advertisement
IT Essentials - Chapter 4
Operating System Fundamentals
IT Essentials
- Chapter 4
Operating System Fundamentals

Operating Systems (OS) are software
programs that control thousands of
operations, provide an interface
between the user and the computer,
and run applications.
IT Essentials
- Chapter 4
Operating System Fundamentals

Computers that are capable of
handling concurrent users and multiple
jobs are often called network servers
or simply "servers". Servers have
operating systems installed called
Network Operating Systems (NOS).
IT Essentials
- Chapter 4
Operating System Fundamentals

Three basic elements make up the
major design components of any
operating system.
IT Essentials
- Chapter 4
Operating System Fundamentals

Three basic elements make up the
major design components of any
operating system.
– User interface
– Kernel
– File management system
IT Essentials
- Chapter 4
Operating System Fundamentals


User interface –
A user interacts with the
computer OS through the user interface.
Simply put, the user interface is the part of the
operating system that a person can use to issue
commands by either typing them at a command
prompt or pointing and clicking the mouse on the
screen of a Graphical User Interface (GUI).
IT Essentials
- Chapter 4
Operating System Fundamentals


Kernel –
This is the core of the OS.
The kernel is responsible for loading and running
programs (processes) and for managing input and
output
IT Essentials
- Chapter 4
Operating System Fundamentals

File management system –
The file
management system is what the OS uses to
organize and manage files.
IT Essentials
- Chapter 4
Operating System Fundamentals

Operating system functions
– File and folder management
When a file is saved, the operating system saves
it, attaches a name to it, and remembers where
it put the file in the hard drive for future use.
IT Essentials
- Chapter 4
Operating System Fundamentals

Operating system functions
– Management of applications
When a user requests a program, the operating
system locates the application and loads it into
the primary memory or RAM of the computer.
IT Essentials
- Chapter 4
Operating System Fundamentals

Operating system functions
– Support for built-in utility programs
Utility programs are programs that the OS uses
to maintain and repair itself. These programs
help identify problems, locate lost files, repair
damaged files, and backup data.
IT Essentials
- Chapter 4
Operating System Fundamentals

Operating system functions
– Access control to computer hardware
The OS sits between the programs and the Basic
Input/Output System (BIOS). All programs that
need hardware resources must first go through
the operating system. The OS in turn can either
access the hardware through the BIOS or
through the device drivers.
IT Essentials
- Chapter 4
Operating System Fundamentals

Operating system types
– Multiuser – Two or more users running
programs and sharing peripheral devices, such
as a printer, at the same time.
IT Essentials
- Chapter 4
Operating System Fundamentals

Operating system types
– Multitasking – The capability of a computer to
run multiple applications at the same time.
IT Essentials
- Chapter 4
Operating System Fundamentals
Operating system types
– Multiprocessing – Allows a computer to have
two or more CPUs (Central Processing Unit) that
programs share.
IT Essentials
- Chapter 4
Operating System Fundamentals
Operating system types
– Multithreading – The capability of a program
to be broken into smaller parts that can be
loaded as needed by the OS. Multithreading
allows individual programs to be multitasked.
IT Essentials
- Chapter 4
Operating System Fundamentals

MS-DOS
– DOS is a collection of programs and
commands used to control the overall
computer operation in a disk-based
system.
– There are three distinct sections that
make up the disk operating system.
These include:
IT Essentials
- Chapter 4
Operating System Fundamentals

MS-DOS
– Boot files – Used during the boot process (that
is, start-up).
IT Essentials
- Chapter 4
Operating System Fundamentals

MS-DOS
– Boot files – Used during the boot process (that
is, start-up).
– File management files – Enables the system
to manage the data that it holds.
IT Essentials
- Chapter 4
Operating System Fundamentals

MS-DOS
– Boot files – Used during the boot process (that
is, start-up).
– File management files – Enables the system
to manage the data that it holds.
– Utility files – Enables the user to manage
system resources, troubleshoot the system, and
configure the system settings.
IT Essentials
- Chapter 4
Operating System Fundamentals

Elements of DOS
– DOS is a command line operating system, it is
not user-friendly. The best way to learn DOS is
to use it.
IT Essentials
- Chapter 4
Operating System Fundamentals

Elements of DOS
– DOS is a command line operating system, it is
not user-friendly. The best way to learn DOS is
to use it.
– DOS can only run one program at a time. It is
not multitasking.
IT Essentials
- Chapter 4
Operating System Fundamentals

Elements of DOS
– DOS is a command line operating system, it is
not user-friendly. The best way to learn DOS is
to use it.
– DOS can only run one program at a time. It is
not multitasking.
– DOS can only run small programs and has
memory limitations.
IT Essentials
- Chapter 4
Operating System Fundamentals

Elements of DOS
– DOS is a command line operating system, it is
not user-friendly. The best way to learn DOS is
to use it.
– DOS can only run one program at a time. It is
not multitasking.
– DOS can only run small programs and has
memory limitations.
– DOS is an essential tool for IT professionals and
is used extensively for troubleshooting.
IT Essentials
- Chapter 4
Operating System Fundamentals

Files
– A file is simply a block of logically related data
that is given a single name and treated as a
single unit.
IT Essentials
- Chapter 4
Operating System Fundamentals

File Attributes
– All files have attributes.
– These are a set of parameters that describe a
file. Given the attributes of a file, it is possible to
determine the nature of the file.
IT Essentials
- Chapter 4
Operating System Fundamentals

File Attributes
– Hidden File – The user will not see this type of file with
any kind of normal file search in a DOS environment.
IT Essentials
- Chapter 4
Operating System Fundamentals
 File
Attributes
– Hidden File – The user will not see this type of file with
any kind of normal file search in a DOS environment.
– Read Only – The user can open and read this type of file
but cannot write or modify the file in any way.
IT Essentials
- Chapter 4
Operating System Fundamentals

File Attributes
– Hidden File – The user will not see this type of file with
any kind of normal file search in a DOS environment.
– Read Only – The user can open and read this type of file
but cannot write or modify the file in any way.
– Archive (backup) status – Used by backup utilities to
determine if a file needs to be backed up or not.
IT Essentials
- Chapter 4
Operating System Fundamentals

File Attributes
– Hidden File – The user will not see this type of file with
any kind of normal file search in a DOS environment.
– Read Only – The user can open and read this type of file
but cannot write or modify the file in any way.
– Archive (backup) status – Used by backup utilities to
determine if a file needs to be backed up or not.
– System File – A file needed by the DOS operating system
for a successful bootup.
IT Essentials
- Chapter 4
Operating System Fundamentals

Internal versus External DOS Commands
– Commands that are built into the
operating system are internal.
– Commands that must be executed from a
file are external.
IT Essentials
- Chapter 4
Operating System Fundamentals

Command Line
– the main user interface is the command
line. The command line is the space
immediately following the DOS prompt.
IT Essentials
- Chapter 4
Operating System Fundamentals

A DOS boot disk is just a floppy disk with
three necessary system files on it:
IT Essentials
- Chapter 4
Operating System Fundamentals

A DOS boot disk is just a floppy disk with
three necessary system files on it:

COMMAND.COM
IO.SYS

MSDOS.SYS

IT Essentials
- Chapter 4
Operating System Fundamentals

To create a bootable disk…
– Insert a blank floppy disk in the drive.
– At the command prompt type
FORMAT A: /s and press Enter.
or
IT Essentials
- Chapter 4
Operating System Fundamentals

To create a bootable disk…
– Insert a blank floppy disk in the drive.
– At the command prompt type FORMAT A: /s and
press Enter.
or
– If the disk is already formatted, type SYS A: and
press Enter.
IT Essentials
- Chapter 4
Operating System Fundamentals

DOS requires these files in this order to boot
your system:
–
–
–
–
–
–
–
BIOS
bootstrap
io.sys
msdos.sys
config.sys
command.com
autoexec.bat
IT Essentials
- Chapter 4
Operating System Fundamentals


During the boot process, while the MS-DOS
message "Starting DOS..." is on, the screen special
function keys are available to alter the loading
process of CONFIG.SYS (and an option for
AUTOEXEC.BAT).
F5 & F8
IT Essentials
- Chapter 4
Operating System Fundamentals
– F5 (or Left Shift key)
Skips CONFIG.SYS file (including AUTOEXEC.BAT
files, if this option is chosen).
– F8
Proceeds through the CONFIG.SYS (and
AUTOEXEC.BAT, if needed) files one step at a
time waiting for Confirmation from the user.
IT Essentials
- Chapter 4
Operating System Fundamentals

SYSEDIT –
is a standard text editor used to edit
system configuration files such as
Config.sys and Autoexec.bat.
IT Essentials
- Chapter 4
Operating System Fundamentals





Conventional Memory
0 and 640KB
Also known as base memory.
This is the area where MS-DOS programs normally
run.
In older DOS machines, this is the only memory
available for running the OS files, application
programs, memory resident routines, and device
drivers. Memory-resident routines include
Terminate-and-Stay-Resident (TSR) Programs such
as mouse and CD-ROM drivers.
IT Essentials
- Chapter 4
Operating System Fundamentals





Upper Memory/Expanded Memory
640KB to 1024KB
Also known as Reserved Memory.
Upper memory is available in the form of Upper
Memory Blocks (UMBs). Programs that run here
include system BIOS, plug and play BIOS, video
BIOS and video RAM.
These addresses are only available if an appropriate
memory manager such as Emm386.EXE is installed
during the startup process.
IT Essentials
- Chapter 4
Operating System Fundamentals




Extended Memory
Beyond the 1 MB limit.
Generally referred to as Extended Memory.
This area of memory is also called Extended
Memory Specification (XMS). XMS is the primary
memory area used by Windows 9x. A device driver
that is loaded by the OS controls this memory area.
Windows 9x loads the XMS driver called Himem.sys
during startup. Once loaded, Himem.sys makes
extended memory available to the Windows 9x and
other compatible MS-DOS programs.
IT Essentials
- Chapter 4
Operating System Fundamentals


High Memory
Once the XMS driver is loaded, extended memory
becomes available to the OS. When this happens,
the first 64KB of extended memory is called the
High Memory Area (HMA).
Typically, the XMS driver (Himem.sys) activates the
DOS=HIGH option, enabling it to copy the MS-DOS
kernel used by Windows 9x into the HMA. The point
therefore, is that DOS uses the HMA, and by doing
so, frees up more conventional memory for use by
applications.
IT Essentials
- Chapter 4
Operating System Fundamentals

Memory management tools
– EMM386.EXE – This memory manager
emulates expanded memory and makes upper
memory available for use by the OS.
IT Essentials
- Chapter 4
Operating System Fundamentals

Memory management tools
– HIMEM.SYS – Load this device driver to
convert memory starting at 1MB available as
XMS or extended memory. It is loaded from the
config.sys file.
– The syntax for this command is
DEVICE=C:\DOS\HIMEM.SYS.
IT Essentials
- Chapter 4
Operating System Fundamentals

Memory management tools
– DOS=HIGH – This option is added into the
Config.sys file to tell the OS to move a portion of
itself (such as MS-DOS Kernel) into the high
memory area. It is usually combined with
DOS=UMB to tell it to create an upper memory
block using the syntax DOS=HIGH, UMB.
IT Essentials
- Chapter 4
Operating System Fundamentals



Memory management tools
DEVICEHIGH/LOADHIGH –
– DEVICEHIGH (used in Config.sys) and
LOADHIGH (used in Autoexec.bat) both put
upper memory blocks to use, once HIMEM.SYS
and Emm386.exe have been loaded.
To load a mouse driver high, for example, use this
syntax: DEVICEHIGH=C: \DOS\MOUSE.SYS
IT Essentials
- Chapter 4
Operating System Fundamentals

Other types of memory
– Virtual Memory:


Swap File in Windows 9x
Page File in Windows 2000
– Hard disk drive space is manipulated to seem
like RAM.
IT Essentials
- Chapter 4
Operating System Fundamentals

Other types of memory
– RAM Drive
Setting aside a portion of RAM to emulate a
harddrive is a RAM drive.
– For example, on a machine that has a hard drive
partitioned into drives C and D, a RAM drive of 4
MB (4096 KB) can be created as E with the
command:
– DEVICE=C: \DOS\RAMDRIVE.SYS 4096
IT Essentials
- Chapter 4
Operating System Fundamentals

Memory conflicts
– General Protection Fault or GPF
– Memory conflicts can be caused by two
memory managers running at the same
time.
– This conflict results in the blue screen of
death.
IT Essentials
- Chapter 4
Operating System Fundamentals

Real Mode
Real mode memory addressing means that
software, such as DOS or its applications, can
address only 1,024 KB (1 MB) of RAM. In other
words, real mode means that the microprocessor
chip addresses the first 1,024 bytes of
"conventional and upper memory" by actually
assigning real addresses to real locations in
memory.
IT Essentials
- Chapter 4
Operating System Fundamentals

Protected Mode
– Protected mode allows one program to fail
without bringing down the whole system.
IT Essentials
- Chapter 4
Operating System Fundamentals

Protected Mode
– Protected mode allows one program to fail
without bringing down the whole system.
– The theory behind protected mode is that what
happens in one area of memory has no effect on
other programs.
IT Essentials
- Chapter 4
Operating System Fundamentals

Protected Mode
– Protected mode allows one program to fail
without bringing down the whole system.
– The theory behind protected mode is that what
happens in one area of memory has no effect on
other programs.
– When running in protected mode, a program is
limited to its own memory space allocation, but
it can access memory above 1MB.
IT Essentials
- Chapter 4
Operating System Fundamentals

Protected Mode
– Protected mode allows one program to fail
without bringing down the whole system.
– The theory behind protected mode is that what
happens in one area of memory has no effect on
other programs.
– When running in protected mode, a program is
limited to its own memory space allocation, but
it can access memory above 1MB.
– Just about every operating system other than
DOS runs in protected mode.
IT Essentials
- Chapter 4
Operating System Fundamentals

Before you take your online exam
review the common DOS commands.
Download