Communications -Inter-process communications,IPC,either between processes running on the same processor,or between processes running on separate processors or separate machines. May be implemented as either shared memory or message passing,or some systems may offer both. Error Detection -Both hardware and software errors must be detected and handled appropriately.Some systems may include complex error avoidance or recovery systems,including backups, RAID drives,and other redundant systems.Debugging and diagnostic tools aid users and administrators in tracing down the cause of problems
• Communications - Inter-process communications, IPC, either between processes running on the same processor, or between processes running on separate processors or separate machines. May be implemented as either shared memory or message passing, ( or some systems may offer both. ) • Error Detection - Both hardware and software errors must be detected and handled appropriately. Some systems may include complex error avoidance or recovery systems, including backups, RAID drives, and other redundant systems. Debugging and diagnostic tools aid users and administrators in tracing down the cause of problems
Resource Allocation -E.g.CPU cycles,main memory,storage space,and peripheral devices. Accounting -Keeping track of system activity and resource usage, either for billing purposes or for statistical record keeping that can be used to optimize future performance
• Resource Allocation - E.g. CPU cycles, main memory, storage space, and peripheral devices. • Accounting - Keeping track of system activity and resource usage, either for billing purposes or for statistical record keeping that can be used to optimize future performance
Protection and Security-Preventing harm to the system and to resources,either through wayward internal processes or malicious outsiders. Authentication,ownership,and restricted access are obvious parts of this system. Highly secure systems may log all process activity down to excruciating detail,and security regulation dictate the storage of those records on permanent non-erasable medium for extended times in secure off-site facilities
• Protection and Security - Preventing harm to the system and to resources, either through wayward internal processes or malicious outsiders. • Authentication, ownership, and restricted access are obvious parts of this system. • Highly secure systems may log all process activity down to excruciating detail, and security regulation dictate the storage of those records on permanent non-erasable medium for extended times in secure ( off-site ) facilities
User Operating-System Interface ·Command Interpreter Graphical User Interface,GUl 。Choice of interface
User Operating-System Interface • Command Interpreter • Graphical User Interface, GUI • Choice of interface
Command Interpreter Gets and processes the next user request,and launches the requested programs. In some systems the CI may be incorporated directly into the kernel. More commonly the Cl is a separate program that launches once the user logs in or otherwise accesses the system
- Command Interpreter • Gets and processes the next user request, and launches the requested programs. • In some systems the CI may be incorporated directly into the kernel. • More commonly the CI is a separate program that launches once the user logs in or otherwise accesses the system