Splendeurs Et Servitudes Des Systèmes D'exploitation

Total Page:16

File Type:pdf, Size:1020Kb

Splendeurs Et Servitudes Des Systèmes D'exploitation Splendeurs et servitudes des Systèmes d’exploitation Histoire, fonctionnement, enjeux Laurent Bloch 27 juillet 2020 ii Du même auteur Initiation à la programmation et aux algorithmes – Avec Python, Technip éd., 2020 Initiation à la programmation et aux algorithmes – Avec Scheme, Technip éd., 2020 Révolution cyberindustrielle en France, Economica éd., 2015 Sécurité informatique – Pour les DSI, RSSI et administrateurs, Eyrolles éd., 5ème édition, 2016 La pensée aux prises avec l’informatique – Systèmes d’information, Laurent Bloch éd., 2017 L’Internet, vecteur de puissance des États-Unis ? - Géopolitique du cyberespace, nouvel espace stratégique, Diploweb éd., 2017 Site Web de l’auteur (comporte des documents complémentaires) https://laurentbloch.net © copyright Laurent Bloch éd. Paris, dépôt légal août 2020 Table des matières Préface de Christian Queinnec 1 Avant-propos 3 1 Présentation des personnages 10 1.1 Mondanité des systèmes ................... 10 1.2 Quelques définitions ..................... 12 1.3 La couche visible du système . 14 1.4 Une représentation : le modèle en couches . 14 1.5 L’informatique est (aussi) une science . 17 1.6 Architectures ......................... 18 1.7 Enjeux d’une histoire ..................... 19 2 Principe de fonctionnement de l’ordinateur 22 2.1 Modèle de l’ordinateur .................... 23 2.2 Traitement de l’information . 27 2.3 Mémoire et action, données et programme . 29 2.4 À quoi ressemble le langage machine ? . 30 2.4.1 Premier programme . 30 2.4.2 Questions sur le programme . 32 2.5 Mot d’état de programme (PSW) . 33 2.6 Premier métalangage ..................... 34 2.6.1 Vers un langage symbolique . 34 2.6.2 Adresses absolues, adresses relatives . 35 2.6.3 Assembleur, table des symboles . 36 2.6.4 Traduction de langages . 37 2.7 Comment cela démarre-t-il ? . 37 2.8 Quel est le rôle de la mémoire ? . 39 2.9 La machine de Turing .................... 40 TABLE DES MATIÈRES iv 3 Du système d’exploitation au processus 44 3.1 Premiers essais ........................ 45 3.2 Simultanéité et multiprogrammation . 47 3.2.1 Chronologie d’une entrée-sortie . 48 3.3 Notion de processus ..................... 49 3.4 Réification du calcul ..................... 50 3.5 Notion de sous-programme . 52 3.6 Points de vue sur les programmes . 54 3.7 Vision dynamique du programme : le processus . 54 3.8 Attributs du système d’exploitation . 55 3.8.1 Mode d’exécution privilégié . 56 3.8.2 Contrôle des programmes . 56 3.8.3 Contrôle de l’activité de tous les processus . 56 3.8.4 Monopole d’attribution des ressources . 57 3.8.4.1 Étreinte fatale . 57 3.8.5 Contrôle de la mémoire . 57 3.8.6 Contrôle des entrées-sorties . 58 3.8.7 Contrôle du temps . 59 3.8.8 Contrôle de l’arrêt et du démarrage de l’ordinateur 59 3.9 Notion d’appel système ................... 59 3.10 Lancement d’un programme . 60 3.10.1 Shell .......................... 61 3.11 Synchronisation de processus, interruption . 63 3.11.1 Demande d’entrée-sortie . 63 3.11.2 Interruption de fin d’entrée-sortie . 65 3.12 Ordonnancement de processus . 67 3.12.1 Stratégies d’ordonnancement . 68 3.12.2 Interruptions et exceptions . 69 3.12.3 Préemption ...................... 69 3.12.4 Synchronisation de processus et sections critiques . 70 3.12.4.1 Atomicité des opérations . 73 3.12.4.2 Masquage des interruptions . 74 3.12.4.3 Verrouillage de la section critique . 74 3.13 Chronologie des premiers systèmes d’exploitation . 76 4 Mémoire 79 4.1 Les problèmes à résoudre . 80 4.2 La mémoire du programme . 81 4.2.1 Les mots de mémoire . 81 4.2.2 Les adresses ...................... 82 TABLE DES MATIÈRES v 4.2.3 Noms et variables . 83 4.2.4 Protection de la mémoire . 85 4.3 Partage de mémoire en multiprogrammation . 86 4.3.1 Exemple : l’OS/360 . 86 4.3.2 Translation des programmes . 87 4.4 Mémoire virtuelle ....................... 89 4.4.1 Insuffisance de la mémoire statique . 89 4.4.2 Organisation générale . 90 4.4.3 Pagination ...................... 91 4.4.4 Espaces adresse .................... 95 4.4.5 Registres associatifs (Translation Lookaside Buffer, TLB) ......................... 98 4.4.6 Tables de pages inverses . 100 4.4.7 Mémoire virtuelle segmentée . 101 4.4.8 Petite chronologie de la mémoire virtuelle . 102 4.5 Hiérarchie de mémoire . 103 4.5.1 Position du problème . 103 4.6 La technique du cache . 104 4.6.1 Cache mémoire . 104 4.6.2 Hiérarchie de mémoire : données numériques . 106 4.6.3 Mise en œuvre du cache . 107 4.7 Langage et mémoire . 107 4.7.1 Langages à mémoire statique . 107 4.7.2 Vecteur d’état d’un programme . 108 4.7.3 Langages à mémoire dynamique . 109 4.7.3.1 Allocation de mémoire sur la pile . 110 4.7.3.2 Allocation de mémoire sur le tas . 111 4.7.3.3 Gestion de la mémoire dynamique . 112 4.7.4 Mémoire d’un programme en cours d’exécution . 113 5 Persistance 114 5.1 Mémoire auxiliaire . 115 5.1.1 Structure physique du disque magnétique . 116 5.1.2 Stockage SSD . 118 5.1.3 Visions de la mémoire auxiliaire . 119 5.2 Système de fichiers . 121 5.2.1 Structure du système de fichiers Unix . 122 5.2.1.1 Notion de système de fichiers . 122 5.2.1.2 La i-liste . 123 5.2.1.3 Répertoires de fichiers . 126 TABLE DES MATIÈRES vi 5.2.1.4 Création d’un système de fichiers . 129 5.2.2 Traitement de fichier . 132 5.2.2.1 Ouverture de fichier . 133 5.2.3 Fichiers, programmes, mémoire virtuelle . 133 5.2.4 Cache de disque . 134 5.3 Systèmes de fichiers en réseau : NFS, SANs et NAS . 136 5.3.1 Disques connectés directement aux serveurs . 136 5.3.2 Systèmes de fichiers en réseau . 137 5.3.3 Architecture SAN . 138 5.3.4 Architecture NAS . 139 5.4 Critique des fichiers ; systèmes persistants . 141 5.4.1 Reprise sur point de contrôle . 145 6 Réseaux 148 6.1 Transmettre de l’information à distance . 150 6.1.1 Théorie de l’information . 151 6.1.2 Premières réalisations . 153 6.1.3 Un modèle pour les réseaux . 153 6.2 Couche 1, physique . 155 6.3 Notion de protocole . 156 6.4 Couche 2, liaison de données . 157 6.4.1 Notion d’adresse réseau . 159 6.4.2 Détection et correction d’erreur pour la couche 2 . 160 6.4.2.1 Découpage en trames (framing) . 160 6.4.2.2 Détection de trames endommagées . 161 6.4.2.3 Contrôle de flux . 162 6.4.3 Un exemple de liaison de données : Ethernet . 165 6.5 Couche 3, réseau . 168 6.5.1 Commutation de circuits . 168 6.5.2 Commutation de paquets . 169 6.5.3 Le protocole IP et l’Internet . 173 6.5.3.1 Organisation administrative de l’Internet 175 6.5.3.2 Organisation topographique de l’Internet 176 6.5.3.3 L’adresse et le datagramme IP . 178 6.5.4 Exception à l’unicité des adresses : traduction d’adresses (NAT) . 183 6.5.4.1 Le principe du standard téléphonique d’hôtel . 183 6.5.4.2 Adresses non routables . 184 6.5.4.3 Accéder à l’Internet sans adresse routable 185 TABLE DES MATIÈRES vii 6.5.4.4 Réalisations . 185 6.5.5 Une solution, quelques problèmes . 188 6.5.6 Traduction de noms en adresses : le DNS . 189 6.5.7 Mécanisme de la couche IP . 194 6.5.7.1 Algorithmes de routage . 196 6.5.7.2 Calcul des tables de routage . 199 6.5.7.3 Reconfiguration en cas de coupure de liaison202 6.5.7.4 Problèmes de routage . 205 6.5.8 Nouvelles tendances IP . 207 6.5.9 En quoi IP est-il supérieur à X25 ? . 208 6.5.9.1 Invention de la transmission par paquets 208 6.5.9.2 Commutation de circuits . 209 6.5.9.3 L’année charnière : 1972 . 210 6.5.9.4 Commutation de paquets . 212 6.6 Couche 4, transport . 213 6.6.1 TCP (Transmission Control Protocol) . 213 6.6.1.1 Connexion . 214 6.6.1.2 Modèle client-serveur et numéros de port 214 6.6.1.3 Poignée de main en trois étapes (three- way handshake) . 215 6.6.1.4 Contrôle de flux et évitement de congestion216 6.6.2 UDP (User Datagram Protocol) . 217 6.7 Les téléphonistes contre-attaquent : ATM . 217 6.8 Promiscuité sur un réseau local . 219 6.8.1 Rappel sur les réseaux locaux . 220 6.8.2 Réseaux locaux virtuels (VLAN) . 221 6.8.3 Sécurité du réseau de campus : VLAN ou VPN ? . 222 6.9 Client–serveur ou pair à pair (peer to peer) ? . 223 6.10 Versatilité des protocoles pair à pair . 225 6.10.1 Définition et usage du pair à pair . 225 6.10.2 Problèmes à résoudre par le pair à pair . 226 7 Protection et sécurité 229 7.1 Protection . 230 7.1.1 Un parangon de protection : Multics . 232 7.1.1.1 Les dispositifs de protection de Multics . 232 7.2 Sécurité ............................ 234 7.2.1 Menaces, risques, vulnérabilités . 234 7.2.2 Principes de sécurité . 234 7.3 Chiffrement . 236 TABLE DES MATIÈRES viii 7.3.1 Chiffrement symétrique à clé secrète . 236 7.3.2 Naissance de la cryptographie informatique : Alan Turing . 237 7.3.3 Data Encryption Standard (DES) . 238 7.3.4 Diffie, Hellman et l’échange de clés .
Recommended publications
  • The Profession of IT Multitasking Without Thrashing Lessons from Operating Systems Teach How to Do Multitasking Without Thrashing
    viewpoints VDOI:10.1145/3126494 Peter J. Denning The Profession of IT Multitasking Without Thrashing Lessons from operating systems teach how to do multitasking without thrashing. UR INDIVIDUAL ABILITY to The first four destinations basi- mercial world with its OS 360 in 1965. be productive has been cally remove incoming tasks from your Operating systems implement mul- hard stressed by the sheer workspace, the fifth closes quick loops, titasking by cycling a CPU through a load of task requests we and the sixth holds your incomplete list of all incomplete tasks, giving each receive via the Internet. In loops. GTD helps you keep track of one a time slice on the CPU. If the task 2001, David Allen published Getting these unfinished loops. does not complete by the end of its O 1 Things Done, a best-selling book about The idea of tasks being closed loops time slice, the OS interrupts it and puts a system for managing all our tasks to of a conversation between a requester it on the end of the list. To switch the eliminate stress and increase produc- and a perform was first proposed in CPU context, the OS saves all the CPU tivity. Allen claims that a considerable 1979 by Fernando Flores.5 The “condi- registers of the current task and loads amount of stress comes our way when tions of satisfaction” that are produced the registers of the new task. The de- we have too many incomplete tasks. by the performer define loop comple- signers set the time slice length long He views tasks as loops connecting tion and allow tracking the movement enough to keep the total context switch someone making a request and you of the conversation toward completion.
    [Show full text]
  • 1St Slide Set Operating Systems
    Organizational Information Operating Systems Generations of Computer Systems and Operating Systems 1st Slide Set Operating Systems Prof. Dr. Christian Baun Frankfurt University of Applied Sciences (1971–2014: Fachhochschule Frankfurt am Main) Faculty of Computer Science and Engineering [email protected] Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS2021 1/24 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Organizational Information E-Mail: [email protected] !!! Tell me when problems problems exist at an early stage !!! Homepage: http://www.christianbaun.de !!! Check the course page regularly !!! The homepage contains among others the lecture notes Presentation slides in English and German language Exercise sheets in English and German language Sample solutions of the exercise sheers Old exams and their sample solutions What is the password? There is no password! The content of the English and German slides is identical, but please use the English slides for the exam preparation to become familiar with the technical terms Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS2021 2/24 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Literature My slide sets were the basis for these books The two-column layout (English/German) of the bilingual book is quite useful for this course You can download both books for free via the FRA-UAS library from the intranet Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS2021 3/24 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Learning Objectives of this Slide Set At the end of this slide set You know/understand.
    [Show full text]
  • BCIS 1305 Business Computer Applications
    BCIS 1305 Business Computer Applications BCIS 1305 Business Computer Applications San Jacinto College This course was developed from generally available open educational resources (OER) in use at multiple institutions, drawing mostly from a primary work curated by the Extended Learning Institute (ELI) at Northern Virginia Community College (NOVA), but also including additional open works from various sources as noted in attributions on each page of materials. Cover Image: “Keyboard” by John Ward from https://flic.kr/p/tFuRZ licensed under a Creative Commons Attribution License. BCIS 1305 Business Computer Applications by Extended Learning Institute (ELI) at NOVA is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted. CONTENTS Module 1: Introduction to Computers ..........................................................................................1 • Reading: File systems ....................................................................................................................................... 1 • Reading: Basic Computer Skills ........................................................................................................................ 1 • Reading: Computer Concepts ........................................................................................................................... 1 • Tutorials: Computer Basics................................................................................................................................ 1 Module 2: Computer
    [Show full text]
  • Virtualization and Security Aspects: an Overview
    Rui Filipe Pereira, Rui Miguel Silva & João Pedro Orvalho Virtualization and Security Aspects: An Overview Rui Filipe Pereira [email protected] Lab UbiNET – Computer Science Security and Cybercrime Polytechnic Institute Of Beja Beja, Portugal Rui Miguel Silva [email protected] Lab UbiNET – Computer Science Security and Cybercrime Polytechnic Institute Of Beja Beja, Portugal João Pedro Orvalho [email protected] Lab UbiNET – Computer Science Security and Cybercrime Polytechnic Institute Of Beja Beja, Portugal Abstract Virtualization allows a single system to concurrently run multiple isolated virtual machines, operating systems (OSes) or multiple instances of a single OS. It helps organizations to improve operational efficiency, reduce costs, improve the use of hardware, and to allocate resources on- demand. Nevertheless, like most technologies, it has vulnerabilities and threats. Research about security issues related to virtualization has been conducted for several years. However, there are still open challenges related to security in virtualization. This paper looks into some of the differences, issues, challenges, and risks caused by virtualization and aims to classify the various virtualization approaches, along with their goals, advantages and drawbacks from a security perspective. Such classification is expected to help in the identification of virtualization technologies that might be applied in a virtualized infrastructure. This work is intended to be an introduction to the security considerations, concerns, and implications arising from use of virtualized systems. Keywords: Virtualization, Cybersecurity, Hypervisor, Virtual Machine, Virtual Machine Monitor. 1. INTRODUCTION Virtualization is a technology that uses a logical environment to overcome the physical limitations of hardware. Due to its characteristics of encapsulation and isolation, virtualization is the basis for cloud computing paradigm.
    [Show full text]
  • Sistemas Operativos Moviles: Funcionalidades, Efectividad Y Aplicaciones Utiles En Colombia. Sanly Aponte Gomez Carlos Davila Ra
    SISTEMAS OPERATIVOS MOVILES: FUNCIONALIDADES, EFECTIVIDAD Y APLICACIONES UTILES EN COLOMBIA. SANLY APONTE GOMEZ CARLOS DAVILA RAMIREZ UNIVERSIDAD EAN FACULTAD DE INGENIERIA DE SISTEMAS TEKHLAR BOGOTA 2011 SISTEMAS OPERATIVOS MOVILES: FUNCIONALIDADES, EFECTIVIDAD Y APLICACIONES UTILES EN COLOMBIA. SANLY APONTE GOMEZ CARLOS DAVILA RAMIREZ Proyecto de Grado Tekhlar II como requisito para optar al título de Ingeniero en Sistemas Asesor ING. JAVIER DUARTE UNIVERSIDAD EAN FACULTAD DE INGENIERIA DE SISTEMAS TEKHLAR BOGOTA 2011 DEDICATORIA SANLY APONTE GOMEZ MIS ESFUERZOS SE LOS DEDICO: A DIOS. Por ser mí guía, fortaleza y protección en cada momento de mi vida, pasando cada día los obstáculos presentados en mis estudios hasta alcanzar mis metas profesionales. A MIS PADRES. Carmen Lucy Gómez Penna y Jaime Aponte Rivillas. Con todo mi amor, les agradezco por confiar en mí, por darme la vida y guiarme por el camino correcto. Es por eso que pude lograr la culminación de mis estudios profesionales, porque sin ustedes no los hubiera finalizado. A MIS HERMANOS. Luis Enrique Aponte y José Alfredo Aponte. Gracias por apoyarme y darme valor en los momentos más difíciles de mis estudios ya que soy un punto de referencia para ustedes. A MI TIA. Yolima Aponte Por ofrecerme todo su apoyo incondicional guiándome en mi vida personal y estudio profesional. A MI COMPAÑERO DE PROYECTO. Carlos Dávila Ramírez. Por su apoyo y acompañamiento en el desarrollo de este Proyecto de Grado que hoy entregamos finalmente. AGRADECIMIENTOS. Agradezco a la UNIVERSIDAD EAN por su buena educación a nivel personal y profesional, dándome buenas prácticas de aprendizaje y oportunidades de desarrollarme como Ingeniera de Sistemas.
    [Show full text]
  • 1St Slide Set Operating Systems
    Organizational Information Operating Systems Generations of Computer Systems and Operating Systems 1st Slide Set Operating Systems Prof. Dr. Christian Baun Frankfurt University of Applied Sciences (1971–2014: Fachhochschule Frankfurt am Main) Faculty of Computer Science and Engineering [email protected] Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS1920 1/31 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Organizational Information E-Mail: [email protected] !!! Tell me when problems problems exist at an early stage !!! Homepage: http://www.christianbaun.de !!! Check the course page regularly !!! The homepage contains among others the lecture notes Presentation slides in English and German language Exercise sheets in English and German language Sample solutions of the exercise sheers Old exams and their sample solutions Participating in the exercises is not a precondition for exam participation But it is recommended to participate the exercises The content of the English and German slides is identical, but please use the English slides for the exam preparation to become familiar with the technical terms Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS1920 2/31 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems The Way a good Course works. Image Source: Google Mr. Miyagi says: „Not only the student learns from his master, also the master learns from his student.“ Active participation please! Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS1920 3/31 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Things, which are bad during a Course.
    [Show full text]
  • Operating Systems What Is OS?
    Operating Systems What is OS? Operating System is a software, which makes a computer to actually work. It is the software the enables all the programs we use. The OS organizes and controls the hardware. OS acts as an interface between the application programs and the machine hardware. Examples: Windows, Linux, Unix and Mac OS, etc., What OS does? An operating system performs basic tasks such as, controlling and allocating memory, prioritizing system requests, controlling input and output devices, facilitating networking and managing file systems. Structure of Operating System: Application Programs System Programs Software (Operating System) HARDWARE (Contd…) Structure of Operating System (Contd…): The structure of OS consists of 4 layers: 1. Hardware Hardware consists of CPU, Main memory, I/O Devices, etc, 2. Software (Operating System) Software includes process management routines, memory management routines, I/O control routines, file management routines. (Contd…) Structure of Operating System (Contd…): 3. System programs This layer consists of compilers, Assemblers, linker etc. 4. Application programs This is dependent on users need. Ex. Railway reservation system, Bank database management etc., Evolution of OS: The evolution of operating systems went through seven major phases. Six of them significantly changed the ways in which users accessed computers through the open shop, batch processing, multiprogramming, timesharing, personal computing, and distributed systems. In the seventh phase the foundations of concurrent programming were developed and demonstrated in model operating systems. (Contd…) Evolution of OS (contd..): Major Technical Operating Phases Innovations Systems Open Shop The idea of OS IBM 701 open shop (1954) Batch Tape batching, BKS system (1961) First-in, first-out Processing scheduling.
    [Show full text]
  • Operating Systems What Is OS?
    Operating Systems What is OS? • Operating System is a software, which makes a computer to actually work. • It is the software the enables all the programs we use. • The OS organizes and controls the hardware. • OS acts as an interface between the application programs and the machine hardware. • Examples: Windows, Linux, Unix and Mac OS, etc., What OS does? An operating system performs basic tasks such as, • controlling and allocating memory, • prioritizing system requests, • controlling input and output devices, • facilitating networking and • managing file systems. Structure of Operating System Application Programs System Programs Software (Operating System) HARDWARE (Contd…) Structure of Operating System (Contd…) The structure of OS consists of 4 layers: 1. Hardware Hardware consists of CPU, Main memory, I/O Devices, etc, 2. Software (Operating System) Software includes process management routines, memory management routines, I/O control routines, file management routines. (Contd…) Structure of Operating System (Contd…) 3. System programs This layer consists of compilers, Assemblers, linker etc. 4. Application programs This is dependent on users need. Ex. Railway reservation system, Bank database management etc., Evolution of OS • The evolution of operating systems went through seven major phases. • Six of them significantly changed the ways in which users accessed computers through the open shop, batch processing, multiprogramming, timesharing, personal computing, and distributed systems. • In the seventh phase the foundations of concurrent programming were developed and demonstrated in model operating systems. (Contd…) Evolution of OS (contd..) Major Phases Technical Innovations Operating Systems Open Shop The idea of OS IBM 701 open shop (1954) Batch Processing Tape batching, BKS system (1961) First-in, first-out scheduling.
    [Show full text]
  • Desarrollo De Herramientas Didácticas Para El Aprendizaje De Symbian OS
    ESCUELA TÉCNICA SUPERIOR DE INGENIERÍA DE TELECOMUNICACIÓN UNIVERSIDAD POLITÉCNICA DE CARTAGENA Proyecto Fin de Carrera Desarrollo de herramientas didácticas para el aprendizaje de Symbian OS AUTOR: Carlos José Piñera Sánchez DIRECTOR: Javier Vales Alonso Octubre / 2007 Autor Carlos José Piñera Sánchez E-mail del Autor [email protected] Director(es) Javier Vales Alonso E-mail del Director [email protected] Codirector(es) - Título del PFC Desarrollo de herramientas didácticas para el aprendizaje de Symbian OS Descriptores Symbian, Sony Ericsson P800, J2ME, C++, Carbide C++, Netbeans Resumen Debido al gran interés que suscitan en la sociedad de hoy en dia los dispositivos móviles, estos, han sufrido una gran evolución en los últimos años. Se han producido una gran cantidad de cambios, tanto en el hardware como en el software ampliando sus capacidades hasta unos límites inimaginables hace algunos años. Este desarrollo ha producido la necesidad de nuevos entornos para los mismos, produciendo el desarrollo de nuevos sistemas operativos encargados de gestionar los dispositivos. Entre todos estos sistemas operativos destaca Symbian OS, ya que nació de un consorcio entre las grandes marcas de desarrollo de tecnología móvil (Nokia, Sony Ericsson, LG, Samsung, etc.) y por tanto ha sido apoyado e incluido en todos sus terminales mas avanzados. Symbian OS es hoy en dia el sistema operativo para sistemas móviles mas expandido. Posee una gran cantidad de peculiaridades que lo hace atractivo para la gestión y desarrollo sobre smartphones. Por todo ello surge la necesidad de aprender a utilizar este sistema operativo. En este proyecto se han desarrollado un completo tutorial de aprendizaje de Symbian/OS, que reúne y explica todas las herramientas que proporciona.
    [Show full text]
  • Operating Systems
    Operating Systems Introduction, Processes, Threads Daniel Gruss October 2, 2020 Table of contents www.tugraz.at 1. Basics 2. History 3. Booting 4. Process and Thread Fundamentals 5. Context Switches 6. Process and Thread Organization 1 Basics What is an Operating System www.tugraz.at 2 What is an Operating System www.tugraz.at 3 What is an Operating System www.tugraz.at 4 What is an Operating System www.tugraz.at Run on all sorts of devices: Servers, Desktops, Notebooks Tablets, Smartphones Routers, Switches, Displays Door Locks, Washing Machines, Toasters Cars, Airplanes .... We focus on general purpose operating systems 5 Operating System Roles www.tugraz.at Referee Illusionist Glue 6 Operating System Roles: Referee www.tugraz.at Referee Manage resource allocation among users and applications Isolation of different users, applications from each other Isolation of applications and operating system Communication between users, application 7 Operating System Roles: Illusionist www.tugraz.at Illusionist Abstraction of hardware and other things Makes application design simpler Each application appears to have the entire machine to itself Illusion of Infinite number of processors (near) infinite amount of memory reliable storage reliable network transport 8 Operating System Roles: Glue www.tugraz.at Glue Libraries, user interface widgets, . 9 Example: File Systems www.tugraz.at Referee Prevent users from accessing each other's files without permission Even after a file is deleted and its space re-used Illusionist Files can grow (nearly) arbitrarily large Files persist even when the machine crashes in the middle of a save 10 Example: File Systems www.tugraz.at Glue Nam ed directories, printf, .
    [Show full text]
  • IBM Research Report Performance and Security Lessons Learned from Virtualizing the Alpha Processor
    RC 24111 (W0611-124), 27 November 2006 Computer Science IBM Research Report Performance and Security Lessons Learned from Virtualizing the Alpha Processor Paul A. Karger IBM Research Division Thomas J. Watson Research Center P. O. Box 704 Yorktown Heights, NY 10598, USA Research Division IBM Almaden – Austin – Beijing – Delhi – Haifa – T.J. Watson – Tokyo – Zurich Limited Distribution Notice: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). Some reports are available at http://www.research.ibm.com/resources/paper_search.html. Copies may requested from IBM T.J. Watson Research Center, 16-220, P.O. Box 218, Yorktown Heights, NY 10598 or send email to [email protected]. This paper has been submitted to the 27th International Symposium on Computer Architecture (ISCA 2007). Performance and Security Lessons Learned from Virtualizing the Alpha Processor Paul A. Karger IBM Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NY 10598 [email protected] ABSTRACT Virtualization has become much more important throughout the computer industry both to improve security and to support multiple workloads on the same hardware with effective isolation between those workloads. The most widely used chip architecture, the Intel and AMD x86 processors, have begun to support virtualization, but the initial implementations show many problem areas.
    [Show full text]
  • Chilton Atlas Hardware at the National Museums Scotland
    Chilton Atlas hardware at the National Museums Scotland. Simon Lavington. November 2013. [email protected] Contents. Summary 2 1. Origins: Atlas in its historical context. 3 2. Atlas in the market-place. 4 3. Relative performance, then and now. 5 4. The Atlas Computer Laboratory at Chilton, Berkshire. 6 5. Technical details of the Chilton Atlas. 9 6. Physical details of equipment layout at Chilton. 10 7. The Atlas artefacts in store at the National Museums Scotland. 14 8. Condition of the units in the NMS Granton store. 19 9. The historical significance of Atlas. 21 Appendix A: Surviving Atlas hardware at other museums. 23 Appendix B: Bibliography and other sources of Atlas information 27 Acknowledgements. Several former Atlas people have helped with technical details. Particular mention should be made of Bob Hopgood, Ted Doubtfire and Yao Chen, all of whom worked on the Chilton Atlas. Picture credits to copyright holders. National Museums Scotland Figures 1(a) and 4. Museum of Science & Industry, Manchester Figure 2. STFC Rutherford Appleton Laboratory Figures 3, 5, 6, 7 and 8 Simon Lavington Figures 1(b), 9 to 16(a), 17(a), Table A2 Science Museum, London Figure 16(b), Table A1 D B G Edwards Figure 17 (b) Computer History Museum, California Table A3. 1 Chilton Atlas hardware at the National Museums Scotland. Summary. In 1962 the British-designed Ferranti Atlas supercomputer was, briefly, the world’s most powerful computing system. In 1973 Dr A G Thomson, Keeper of the Department of Technology at the Royal Scottish Museum, asked the Science Research Council to donate some representative sections of a redundant Atlas for preservation and eventual display.
    [Show full text]