I/O Software Layers (User Level, Device Drivers, Kernel)
Threats and Attacks (Virus, Worms, Trojan, DoS)
Case Study: Modern Operating Systems
I/O Management deals with how a computer handles communication between hardware devices (like keyboard, mouse, printer, disk) and the CPU.
Key Functions:
Device Management
The OS controls devices using device drivers
(software that communicates with hardware).
Buffering
Temporary storage area used to handle speed
differences between devices.
Example:Data from a slow keyboard
stored before processing.
Caching
Frequently used data is stored in faster
memory for quick access.
Spooling (Simultaneous Peripheral Operations
On-Line)
Jobs are queued for devices.
Example:Printer queue.
Interrupt Handling
Devices send signals (interrupts) to the CPU when they need attention.
Types of I/O:
Synchronous I/O → CPU waits until operation
completes
Asynchronous I/O → CPU continues other tasks
Example:
When you print a document:
OS sends data to printer driver
Data is stored in spool
Printer prints one job at a time
🔹 Security in Operating Systems
Security ensures that system resources and
data are protected from unauthorized access, misuse, or attacks.
Goals of Security:
Confidentiality →
Data is kept private
Integrity →
Data is not altered improperly
Availability →
System is accessible when needed
(This is often called the CIA Triad) (What Is
the CIA Triad? The three letters in "CIA triad" stand for Confidentiality,
Integrity, and Availability.)
Key Security Mechanisms:
1. Authentication
Verifying identity
Passwords
Biometrics (fingerprint, face recognition)
2. Authorization
Determining access rights
File permissions (read, write, execute)
3. Encryption
Protecting data by converting it into
unreadable form
Used in secure communication
4. Access Control
Role-based access (Role-Based Access Control (RBAC)
is a security model that grants access to systems, applications, and data based
on a user’s predefined role rather than assigning permissions
individually.)
User privileges (User privileges refer to the rights and permissions assigned to users in a system, allowing them to perform specific tasks.)
5. Auditing & Logging
Tracking system activity for security analysis
6. Firewalls & Intrusion
Detection
Monitor incoming/outgoing traffic
Detect suspicious behavior
🔹 Relationship Between I/O Management and Security
I/O operations can be a security risk if not
properly controlled.
Examples:
Unauthorized USB access → Data theft
Malicious device drivers → System compromise
Network I/O → Cyber attacks
Protection Measures:
Device access restrictions
Secure drivers
Data encryption during transfer
Input validation (prevent malicious input)
🔹 Simple Summary
|
Concept |
Purpose |
|
I/O Management |
Efficient handling of
devices and data transfer |
|
Security |
Protection of data and
system resources |
I/O Device Management:
I/O Device
Management is a core function of the operating system that controls and
coordinates all input and output devices attached to a computer system. It
ensures efficient, reliable, and secure communication between hardware devices
and software.
🔸 Objectives
Provide a uniform interface to different
devices
Optimize performance of I/O operations
Handle device errors and interrupts
Ensure safe and secure access to devices
🔸 Key Functions
1. Device Drivers
Specialized programs that act as a bridge
between OS and hardware
Each device (printer, keyboard, disk) has its
own driver
👉
Without drivers, the OS cannot communicate with devices properly.
2. Device Allocation
OS decides which process gets access to a
device
Prevents conflicts when multiple processes
request the same device
3. I/O Scheduling
Determines the order in which I/O requests are
handled
Improves system performance
Example
(for disks):
FCFS (First Come First Serve)
SSTF (Shortest Seek Time First)
4. Buffering
Temporary storage used to handle speed
differences
Helps in smooth data transfer
Example:
Keyboard input stored before processing
5. Caching
Stores frequently accessed data in faster
memory
Reduces access time
6. Spooling
Stores I/O tasks in a queue
Devices process jobs one at a time
Example: Printer
queue
7. Interrupt Handling
Devices send signals (interrupts) when they
need CPU attention
CPU pauses current task and handles the device
request
8. Error Handling
Detects and manages device errors
Example:
Disk read failure, printer out of paper
🔸 Types of I/O Devices
Input Devices
Keyboard
Mouse
Scanner
Output Devices
Monitor
Printer
Speakers
Storage Devices
Hard disk
USB drive
🔸 Techniques of I/O Operation
Programmed I/O
CPU directly controls device
Inefficient (CPU waits)
Interrupt-Driven I/O
CPU works on other tasks until interrupt
occurs
Direct Memory Access (DMA)
Data transfer happens directly between memory
and device
CPU involvement is minimal → faster
performance
🔸 Advantages
Efficient device utilization
Reduced CPU workload
Faster data transfer
Better system performance
🔸 Simple Summary
I/O Device Management = Managing hardware
devices efficiently using drivers, scheduling, buffering, and interrupts.
I/O Hardware
(Interrupts, Polling, DMA),
I/O Hardware: Interrupts,
Polling, and DMA
These are three important techniques used by
the operating system and hardware to manage input/output operations
efficiently.
1. Interrupts
Definition
An interrupt is a signal sent by an I/O device
to the CPU to indicate that it needs attention.
How it Works
CPU executes a program
Device sends an interrupt signal
CPU pauses current task
CPU executes an Interrupt Service Routine
(ISR)
CPU resumes previous task
Features
Efficient (CPU doesn’t waste time waiting)
Used in most modern systems
Example
Keyboard sends interrupt when a key is pressed
2. Polling
Polling is a method where the CPU repeatedly
checks the status of an I/O device to see if it needs attention.
How it Works
CPU continuously checks device status register
If device is ready → CPU performs I/O
If not → CPU keeps checking
Features
Simple to implement
Inefficient (CPU time is wasted)
Example
CPU repeatedly checking if printer is ready
🔸 3. Direct Memory Access (DMA)
DMA allows devices to transfer data directly
to/from memory without continuous CPU involvement.
How it Works
CPU initializes DMA controller
DMA takes control of system bus
Data transfer occurs directly between device
and memory
DMA sends interrupt to CPU after completion
Features
High-speed data transfer
Reduces CPU workload
Used for large data transfers
Example
Disk reading large files into memory
🔸 Comparison Table
|
Feature |
Polling |
Interrupts |
DMA |
|
CPU Involvement |
High |
Medium |
Low |
|
Efficiency |
Low |
High |
Very High |
|
Speed |
Slow |
Faster |
Fastest |
|
Use Case |
Simple devices |
General I/O |
Large data transfer |
🔸 Key Differences (Simple View)
Polling → CPU keeps asking
Interrupts → Device notifies CPU
DMA → Device transfers data directly
🔸 Simple Summary
Polling wastes CPU time
Interrupts improve efficiency
DMA gives best performance for bulk data
transfer
No comments:
Post a Comment