History Of Operating Systems 1950s - Auckland

1y ago
8 Views
2 Downloads
1.76 MB
5 Pages
Last View : 5d ago
Last Download : 3m ago
Upload by : Rosemary Rios
Transcription

History of Operating Systems1950sWhy review the history of OSs?Seeing how OSs developed shows the link between thecapabilities of hardware and the design of OSs.It explains why OSs are as they are now.History seems to repeat.UNIVAC 1This figure and some others in the slides are from an earlier versionof the prescribed text Operating Systems Concepts (8th edition) bySilberschatz, Galvin and Gagne.Operating SystemsLecture 02page1Operating SystemsTotal ControlLecture 02page2COMPSCI 101 1950’s styleCirca 1950sComputers were very expensive.Users (they were all programmers) booked thewhole machine. They had to: prepare their program and data cardsdo all the setup and loading requiredcontrol the computer through console switchesdebug using console lights and switchesThis required a large amount of knowledgeabout the computer and peripherals.Inefficient use of the machine.Computers could execute 10s of thousands ofinstructions per second.But they were idle almost all the time.Operating SystemsLecture 02page3 clear computer storageready the compiler paper tapeready the tape for the compiled outputput the source code cards in the card readerset the switches to load the compilerstart the compilerif errors - work out what they are and try againclear computer storageready the compiled object tape (still needs linking)ready the i/o subroutines tape and linkerready the tape for the output runnable programload and run the linkerready the printer or output tapeclear computer storageready the runnable program tapeput the data cards in the card readerload and run the programif errors – work out what they are and try againOperating SystemsLecture 02page4

What did the OS look like?Computer Operators & Off-liningMost of the OS at this stage was comprised ofthe decisions and actions of the user.There were rudimentary components such asstandard IO routines which were theforerunner of device drivers and systemcalls.Several speed-ups No memory management – every address wasreachable. No file system – the user loads the correct tapes. Security – the door could be locked. IO was polled for - no need for anything faster Some standard IO routines – useful code to read andwrite to tape and printers. Only one program at a time. No problems with synchronization. Programs communicate through paper tapes. User interface was almost the bare machine. Accounting maintained independently of the system.Operating SystemsLecture 02pageexperiencemultiple operators (early multiprogramming?)batching similar jobs together (sometimes called phasing)keeping the programmer away from the computerChangesNo real changes from the hardware or OS perspective.But procedures were more formal.The first UIs were instruction sheets to the operators.The next step was to automate some of these procedures.Off-liningThe arrival of magnetic tape substantially improved IO.Small cheap computers did the slow IO from paper tape to mag tape.And from mag tape to the printer.The big expensive computer used the mag tapes for IO.Several programs submitted to the BEC on one tape.The first parallelism in computer systems.5Operating SystemsResident monitorsLecture 02page6Control programsThe computer operators had formalprocedures.The resident monitor needed instructions.Get the computer to help.Special cards that tell the resident monitorwhich programs to runWhat it needsA program always in memory (hence the “resident”).A control language - commands had to be given to the residentmonitor.The starting point of OSs.Resident monitor could JOB FTN RUN DATA ENDSpecial characters distinguish control cardsfrom data or program cards:clear memory used by the last program (but not itself )load the next programfind the data for the programjump to the start address of the new program, returning to theresident monitor when finishedit also maintained the standard IO routines in memory in column 1// in column 1 and 2709 in column 1The first Job Control Languages (JCLs).What was missing?Operating SystemsLecture 02page7Operating SystemsLecture 02page8

What had changed?Change in the hardware No memory management – every address was stillreachable. Still no real file system, but there is a distinctionbetween data and programs. Security – maintained by the operators. IO still polled for. Programmers now basically forced to use the standardIO routines. Only one program at a time. But two programs inmemory. Still no problems with synchronization. Problems with bad programs – system neededresetting when something bad happened. Depending on the types of devices the output of oneprogram could automatically become the input ofanother. User interface was the JCL. Accounting still maintained independently of thesystem.Disk drivesDisks provided substantially faster access to large amounts ofstorage.Interruptible processorsDevices raising interrupts and processors responding to themsubstantially changed the way IO was performed.Development from single location return addresses to the useof a stack.I/O devices and the CPU can executeconcurrently.I/O is from the device to local buffer ofcontroller.CPU moves data to main memory from localbuffer of controller.Device controller informs CPU that it hasfinished its operation by causing aninterrupt.Operating SystemsLecture 02page9Operating SystemsSPOOLingLecture 02page 10MultiprogrammingSimultaneous Peripheral Operation On-LineTime waiting for IO can be used.No longer need the small cheap computers for IO.We are doing things simultaneously.processing a programreading cards for another programprinting data for another programThe next step is obvious.Have several programs in memory at once.Memory now holds a running programinterrupt driven card reader control programinterrupt driven printer control programdisk control softwarebuffers for data being transferred between thecomputer and devices a program loader a JCL interpreter a rudimentary file system – some data stays“permanently” on the diskOperating SystemsLecture 02What do we need?a lot more memorya schedulera way of keeping track of which program is where in memoryand where its data is, on card, disk etcbetter ways of handling errorsa way to preserve the memory of each programpage11Operating SystemsLecture 02page 12

Memory protectionWhy do we need both?Can be provided by software.What is an example?A system that keeps programmers completely away fromdirect access to memory addresses.Alternatively, a check of every address by an instruction filter.But far more efficiently and safely done byhardware.If we had modes and privileged instructionsbut full memory accessObviously no memory protectionbut also no protection of the privileged instructions- put any code you want in the system areas of memoryIf we could limit memory accesses but therewere no modes and privileged instructionsTwo requirementsOperating modes and privileged instructionsLimited address rangeProvide hardware support to differentiatebetween at least two modes of operation.Instructions are used to set up the memory managementregisters.If these are not privileged a user can change the area ofmemory available.1. User mode – execution done on behalf of a user.2. Kernel mode (also monitor mode, supervisor mode,privileged mode or system mode) – execution done onbehalf of the operating system.Operating SystemsLecture 02page 13Operating SystemsLecture 02page 14Processor modesMemory protectionAdded to the hardware processor status register (or similar) toindicate which mode the processor is operating in.Interrupts, faults, system calls cause the processor to changemode and jump to a particular location.Privileged instructions cannot be executed in user mode.Each process gets allocated an area of memorywhich it can access.All accesses outside that memory cause anexception (or fault).!fixed size partitionsprocesses were designed to load in a particularpartition!base-limit registers!memory pagesMode bitDevices can be protected usingmemory protectionor privileged instructionsInterrupt/fault/system callkerneluserset user modeOperating SystemsLecture 02page 15Operating SystemsLecture 02page 16

Batch systemsBatch system innovationsWith memory protection and processor modeswe can safely have multiple programs inmemory.Each job had its own protected memory.Disks with file systems.Files were associated with owners.fromScheduling was automated.The aim was to effectively utilise all of the expensivehardware.Computer operators now too slow.Individual jobs could be suspended or killed, allowing otherjobs to progress.toComputer operators had consoles.Maybe even VDUs.Accounting could now be done automatically.But from the programmer’s point of viewnothing much had changed.Operating SystemsLecture 02page 17Before the next lectureRead textbook sections1.3 Computer-System Architecture1.11 Computing Environments2.7.5 Hybrid SystemsOperating SystemsLecture 02page 19Operating SystemsLecture 02page 18

Operating Systems Lecture 02 page Batch systems With memory protection and processor modes we can safely have multiple programs in memory. from to 17 Operating Systems Lecture 02 page Batch system innovations Each job had its own protected memory. Disks with file systems. Files were associated with owners. Scheduling was automated.

Related Documents:

Information About African Americans in the 1950s As the 1950s began.segregationist policies in many sections of the United States still denied equal rights to most African Americans.The "separate but equal" doctrine, which had been the law since the 1890s, forced blacks throughout the South to use separate public bathrooms, water fountains, restaurants. hotels, and schools.

Chapter 1 - Introduction to Operating Systems Outline 1.1 Introduction 1.2 What Is an Operating System? 1.3 Early History: The 1940s and 1950s 1.4 The 1960s 1.5 The 1970s 1.6 The 1980s 1.7 History of the Internet and World Wide Web 1.8 The 1990s 1.9 2000 and Beyond 1.10 Application Bases

Operating Systems, Embedded Systems, and Real-Time Systems Janez Puhan Ljubljana, 2015. CIP-CatalogingInPublication NationalandUniversityLibrary,Ljubljana 004.451(078.5)(0.034.2) PUHAN,Janez,1969-Operating Systems, Embedded Systems, and Real-Time Systems [Electronic

Operating Systems: Design and Implementation, 3rd edition This popular text on operating systems is the only book covering both the princi ples of operating systems and their application to a real system. All the traditional operating systems topics are covered in detail. In addition, the principles are care

Operating Systems and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common to most operating systems Know the difference between stand-alone operating systems and network operating systems Identify various stand-alone operating systems

Chris Dupont Operating Systems Programmer/Analyst 3 Theresa Chu Operating Systems Programmer/Analyst 3 Gabe Abreu Operating Systems Programmer/Analyst 1 Temitope Leshi Operating Systems Programmer/Analyst 1 Identity and Acceess Management Dylan Marquis Operating Systems Porgrammer/Anlayst 3 R

220405 US History: IB History of the Americas I 220406 US History: Gifted and Talented 220409 US History: Honors 220614 NOCCA Integrated World History IV 220407 US History: DE CHIS 2013 American History I 220408 US History: DE CHIS 2023 American History II LASMSA courses 1 unit 220501 Civics 1 year 220502 Government

asset management industry, that in the future will need to move these resources within its boundaries. handling compliance some Regulatory challenges In the past few years, regulatory compliance has constantly been at the top of asset manager’s agenda. Currently, the most debated regulation is the upcoming Market in Financial Instruments Directive (MiFID II), as it covers many areas of the .