Talk:Operating system

From WikiProjectMed
Jump to navigation Jump to search

Edit request

Please replace the current contents of the "security" subsection with the following:

Extended content

Security means protecting users from other users of the same computer, as well as from those who seeking remote access to it over a network.[1] Operating systems security rests on achieving the CIA triad: confidentiality (unauthorized users cannot access data), integrity (unauthorized users cannot modify data), and availability (ensuring that the system remains available to authorized users, even in the event of a denial of service attack).[2] As with other computer systems, isolating security domains—in the case of operating systems, the kernel, processes, and virtual machines—is key to achieving security.[3] Other ways to increase security include simplicity to minimize the attack surface, locking access to resources by default, checking all requests for authorization, principle of least authority (granting the minimum privilege essential for performing a task), privilege separation, and reducing shared data.[4]

Some operating system designs are more secure than others. Those with no isolation between the kernel and applications are least secure, while those with a monolithic kernel like most general-purpose operating systems are still vulnerable if any part of the kernel is compromised. A more secure design features microkernels that separate the kernel's privileges into many separate security domains and reduce the consequences of a single kernel breach.[5] Unikernels are another approach that improves security by minimizing the kernel and separating out other operating systems functionality by application.[5]

Most operating systems are written in C or C++, which can cause vulnerabilities. Despite various attempts to protect against them, a substantial number of vulnerabilities are caused by buffer overflow attacks, which are enabled by the lack of bounds checking.[6] Hardware vulnerabilities, some of them caused by CPU optimizations, can also be used to compromise the operating system.[7] Programmers coding the operating system may have deliberately implanted vulnerabilities, such as back doors.[8]

Operating systems security is hampered by their increasing complexity and the resulting inevitability of bugs.[9] Because formal verification of operating systems may not be feasible, operating systems developers use hardening to reduce vulnerabilities,[10] such as address space layout randomization, control-flow integrity,[11] access restrictions,[12] and other techniques.[13] Anyone can contribute code to open source operating systems, which have transparent code histories and distributed governance structures.[14] Their developers work together to find and eliminate security vulnerabilities, using techniques such as code review and type checking to avoid malicious code.[15][16] Andrew S. Tanenbaum advises releasing the source code of all operating systems, arguing that it prevents the developer from falsely believing it is secret and relying on security by obscurity.[17]

References

  1. ^ Tanenbaum & Bos 2023, pp. 605–606.
  2. ^ Tanenbaum & Bos 2023, p. 608.
  3. ^ Tanenbaum & Bos 2023, p. 609.
  4. ^ Tanenbaum & Bos 2023, pp. 609–610.
  5. ^ a b Tanenbaum & Bos 2023, p. 612.
  6. ^ Tanenbaum & Bos 2023, pp. 648, 657.
  7. ^ Tanenbaum & Bos 2023, pp. 668–669, 674.
  8. ^ Tanenbaum & Bos 2023, pp. 679–680.
  9. ^ Tanenbaum & Bos 2023, pp. 605, 617–618.
  10. ^ Tanenbaum & Bos 2023, pp. 681–682.
  11. ^ Tanenbaum & Bos 2023, p. 683.
  12. ^ Tanenbaum & Bos 2023, p. 685.
  13. ^ Tanenbaum & Bos 2023, p. 689.
  14. ^ Richet & Bouaynaya 2023, p. 92.
  15. ^ Richet & Bouaynaya 2023, pp. 92–93.
  16. ^ Berntsso, Strandén & Warg 2017, pp. 130–131.
  17. ^ Tanenbaum & Bos 2023, p. 611.

Please add the following references to the "further reading" section:

  • Berntsson, Petter Sainio; Strandén, Lars; Warg, Fredrik (2017). Evaluation of Open Source Operating Systems for Safety-Critical Applications. Springer International Publishing. pp. 117–132. ISBN 978-3-319-65948-0.
  • Richet, Jean-Loup; Bouaynaya, Wafa (2023). "Understanding and Managing Complex Software Vulnerabilities: An Empirical Analysis of Open-Source Operating Systems". Systèmes d'information & management. 28 (1): 87–114. doi:10.54695/sim.28.1.0087.

Reasons: add refs, rewrite according to due weight in reliable sources, cover security concerns of open source operating systems

Thank you Buidhe paid (talk) 03:58, 2 February 2024 (UTC)[reply]

@Buidhe paid, these are a lot of changes. I admit I haven't reviewed it in detail, but at a glance it looks fine. Why exactly are you submitting a COI edit request? I understand you've declared a COI with regards to Anderson & Dahlin but you are not adding or removing any references to that book. I feel like you should just make this change directly to the article. Mokadoshi (talk) 08:59, 9 April 2024 (UTC)[reply]
ok, I will do that. Technically I have a COI because I received pay for these edits, but I am only asked to improve articles according to existing policy /guidelines. Buidhe paid (talk) 21:46, 9 April 2024 (UTC)[reply]

Edit request 2

Please remove the top-level section on "real-time operating systems" (they will be covered under "types of operating systems") and change the content of the "Types of operating systems" section to the following:

Extended content

Multicomputer operating systems

With multiprocessors multiple CPUs share memory. A multicomputer or cluster computer has multiple CPUs, each of which has its own memory. Multicomputers were developed because large multiprocessors are difficult to engineer and prohibitively expensive;[1] they are universal in cloud computing because of the size of the machine needed.[2] The different CPUs often need to send and receive messages to each other;[3] to ensure good performance, the operating systems for these machines need to minimize this copying of packets.[4] Newer systems are often multiqueue—separating groups of users into separate queues—to reduce the need for packet copying and support more concurrent users.[5] Another technique is remote direct memory access, which enables each CPU to access memory belonging to other CPUs.[3] Multicomputer operating systems often support remote procedure calls where a CPU can call a procedure on another CPU,[6] or distributed shared memory, in which the operating system uses virtualization to generate shared memory that does not actually exist.[7]

Distributed systems

A distributed system is a group of distinct, networked computers—each of which might have their own operating system and file system. Unlike multicomputers, they may be dispersed anywhere in the world.[8] Middleware, an additional software layer between the operating system and applications, is often used to improve consistency. Although it functions similarly to an operating system, it is not a true operating system.[9]

Embedded

Embedded operating systems are designed to be used in embedded computer systems, whether they are internet of things objects or not connected to a network. Embedded systems include many household appliances. The distinguishing factor is that they do not load user-installed software. Consequently, they do not need protection between different applications, enabling simpler designs. Very small operating systems might run in less than 10 kilobytes,[10] and the smallest are for smart cards.[11] Examples include Embedded Linux, QNX, VxWorks, and the extra-small systems RIOT and TinyOS.[12]

Real-time

A real-time operating system is an operating system that guarantees to process events or data by or at a specific moment in time. Hard real-time systems require exact timing and are common in manufacturing, avionics, military, and other similar uses.[12] With soft real-time systems, the occasional missed event is acceptable; this category often includes audio or multimedia systems, as well as smartphones.[12] In order for hard real-time systems be sufficiently exact in their timing, often they are just a library with no protection between applications, such as eCos.[12]

Virtual machine

A virtual machine is an operating system that runs as an application on top of another operating system.[13] The virtual machine is unaware that it is an application and operates as if it had its own hardware.[13][14] Virtual machines can be paused, saved, and resumed, making them useful for operating systems research, development,[15] and debugging.[16] They also enhance portability by enabling applications to be run on a computer even if they are not compatible with the base operating system.[13]

References

  1. ^ Tanenbaum & Bos 2023, p. 557.
  2. ^ Tanenbaum & Bos 2023, p. 558.
  3. ^ a b Tanenbaum & Bos 2023, p. 565.
  4. ^ Tanenbaum & Bos 2023, p. 562.
  5. ^ Tanenbaum & Bos 2023, p. 563.
  6. ^ Tanenbaum & Bos 2023, p. 569.
  7. ^ Tanenbaum & Bos 2023, p. 571.
  8. ^ Tanenbaum & Bos 2023, p. 579.
  9. ^ Tanenbaum & Bos 2023, p. 581.
  10. ^ Tanenbaum & Bos 2023, pp. 37–38.
  11. ^ Tanenbaum & Bos 2023, p. 39.
  12. ^ a b c d Tanenbaum & Bos 2023, p. 38.
  13. ^ a b c Anderson & Dahlin 2014, p. 11.
  14. ^ Silberschatz et al. 2018, pp. 701.
  15. ^ Silberschatz et al. 2018, pp. 705.
  16. ^ Anderson & Dahlin 2014, p. 12.

Also, please add the following source to further reading:

Reason: fix unsourced text, add a concise summary of virtual machines. I removed the "Single- and multi-user" section because it duplicates information that is in the new "Concurrency" section. Buidhe paid (talk) 02:57, 10 February 2024 (UTC)[reply]

Edit request 3

Please add the following content directly after the lead:

Extended content

Definition and purpose

An operating system is difficult to define,[1] but has been called "the layer of software that manages a computer's resources for its users and their applications".[2] Operating systems include the software that is always running, called a kernel—but can include other software as well.[1][3] The two other types of programs that can run on a computer are system programs—which are associated with the operating system, but may not be part of the kernel—and applications—all other software.[3]

There are three main purposes that an operating system fulfills:[4]

  • Operating systems allocate resources between different applications, deciding when they will receive central processing unit (CPU) time or space in memory.[4] On modern personal computers, users often want to run several applications at once. In order to ensure that one program cannot monopolize the computer's limited hardware resources, the operating system gives each application a share of the resource, either in time (CPU) or space (memory).[5][6] The operating system also must isolate applications from each other to protect them from errors and security vulnerability is another application's code, but enable communications between different applications.[7]
  • Operating systems provide an interface that abstracts the details of accessing hardware details (like physical memory) to make things easier for programmers.[4][8] Virtualization also enables the operating system to mask limited hardware resources; for example, virtual memory can provide a program with the illusion of nearly unlimited memory that exceeds the computer's actual memory.[9]
  • Operating systems provide common services, such as an interface for accessing network and disk devices. This enables an application to be run on different hardware without needing to be rewritten.[10] Which services to include in an operating system varies greatly, and this functionality makes up the great majority of code for most operating systems.[11]

References

  1. ^ a b Tanenbaum & Bos 2023, p. 4.
  2. ^ Anderson & Dahlin 2014, p. 6.
  3. ^ a b Silberschatz et al. 2018, p. 6.
  4. ^ a b c Anderson & Dahlin 2014, p. 7.
  5. ^ Anderson & Dahlin 2014, pp. 9–10.
  6. ^ Tanenbaum & Bos 2023, pp. 6–7.
  7. ^ Anderson & Dahlin 2014, p. 10.
  8. ^ Tanenbaum & Bos 2023, p. 5.
  9. ^ Anderson & Dahlin 2014, p. 11.
  10. ^ Anderson & Dahlin 2014, pp. 7, 9, 13.
  11. ^ Anderson & Dahlin 2014, pp. 12–13.
  • Tanenbaum, Andrew S.; Bos, Herbert (2023). Modern Operating Systems, Global Edition. Pearson Higher Ed. ISBN 978-1-292-72789-9.

Reason: all OS textbooks that I was able to access started out by defining what an OS is and explaining its purpose. This section is missing in the current article. Buidhe paid (talk) 20:52, 2 February 2024 (UTC)[reply]

@Buidhe paid: Historically the term operating system has included a lot more than kernels, typically including unprivileged program such as commands, compilers and binders.
Also, the unpaide {{collapse bottom}} generates an extraneous }} line after the references. My reading of the documentation suggests that it wouldn't be appropriate even if properly paired with a {{collapse top}}. -- Shmuel (Seymour J.) Metz Username:Chatul (talk) 22:30, 2 February 2024 (UTC)[reply]
If you can improve on my text, please feel free to do so. I am just reporting what it says in the cited source. I cannot see any stray curly braces and if there were any, I assume the person implementing the request would disregard them. Yes, you need a collapse bottom to mark the end of the collapsed section, otherwise your comment would be collapsed too. Buidhe paid (talk) 22:46, 2 February 2024 (UTC)[reply]
Note: I checked a few more sources and tweaked the definition accordingly. Buidhe paid (talk) 00:05, 6 February 2024 (UTC)[reply]

Edit request 4

Please change the section header titled "multitasking" to "concurrency". Reason: this is a more commonly used term in OS textbooks (see here for evidence).

Also, please change the content of the section (including the hatnote) to:

Extended content

Concurrency

Concurrency refers to the operating system's ability to carry out multiple tasks simultaneously.[1] Virtually all modern operating systems support concurrency.[2]

Threads enable splitting a process' work into multiple parts that can run simultaneously.[3] The number of threads is not limited by the number of processors available. If there are more threads than processors, the operating system kernel schedules, suspends, and resumes threads, controlling when each thread runs and how much CPU time it receives.[4] During a context switch a running thread is suspended, its state is saved into the thread control block and stack, and the state of the new thread is loaded in.[5] Historically, on many systems a thread could run until it relinquished control (cooperative multitasking). Because can allow a single thread to monopolize the processor, most operating systems now can interrupt a thread (preemptive multitasking).[6]

Threads have their own thread ID, program counter (PC), a register set, and a stack, but share code, heap data, and other resources with other threads of the same process.[7][8] Thus, there is less overhead to create a thread than a new process.[9] On single-CPU systems, concurrency is switching between processes. Many computers have multiple CPUs.[10] Parallelism with multiple threads running on different CPUs can speed up a program, depending on how much of it can be executed concurrently.[11]

Synchronization

Given that threads usually share data with other threads from the same process, the order in which threads are executed could impact the result.[12] There are no guarantees about the order of execution between different threads.[13] This makes debugging multithreaded processes much more difficult.[14][15] If a program produces a different result depending on the order in which threads are executed, this is called a race condition.[16]

There are different ways of avoiding race conditions. A simple option is atomic operations that cannot be interrupted or interleaved with other processes.[17] Shared objects (sometimes called monitors)[18] encapsulating heap-allocated memory into an object. The synchronization status is built into the object and hidden from the programmer, but enables the object to be locked while in use by another thread.[19] Condition variables enable a thread to wait until a lock has been released.[20] Locks can only be used by one thread at a time, often reducing performance.[21] In an attempt to increase parallelism and improve performance, programmers can split a shared object into multiple shared objects. However, this approach can cause unexpected results from interactions across objects.[21]

The use of multiple locks can cause a deadlock where multiple threads are waiting for each other to finish and release their lock on a resource, thus halting execution.[22] Many operating systems include deadlock detection and recovery features,[23] for example, killing processes,[24] interrupting a process,[25] taking advantage of checkpoints to move back in the execution of a program.[26] Although the operating system can almost never prevent deadlocks, some use heuristics similar to the banker's algorithm to avoid some cases.[27] Communication deadlocks occur when two processes are waiting for a reply from each other. Timeouts are often employed to break these deadlocks.[28]

References

  1. ^ Anderson & Dahlin 2014, p. 129.
  2. ^ Silberschatz et al. 2018, p. 159.
  3. ^ Anderson & Dahlin 2014, p. 130.
  4. ^ Anderson & Dahlin 2014, p. 131.
  5. ^ Anderson & Dahlin 2014, pp. 157, 159.
  6. ^ Anderson & Dahlin 2014, p. 139.
  7. ^ Silberschatz et al. 2018, p. 160.
  8. ^ Anderson & Dahlin 2014, p. 183.
  9. ^ Silberschatz et al. 2018, p. 162.
  10. ^ Silberschatz et al. 2018, pp. 162–163.
  11. ^ Silberschatz et al. 2018, p. 164.
  12. ^ Anderson & Dahlin 2014, pp. 183–184.
  13. ^ Anderson & Dahlin 2014, p. 140.
  14. ^ Silberschatz et al. 2018, p. 165.
  15. ^ Anderson & Dahlin 2014, p. 184.
  16. ^ Anderson & Dahlin 2014, p. 187.
  17. ^ Anderson & Dahlin 2014, p. 189.
  18. ^ Anderson & Dahlin 2014, p. 197.
  19. ^ Anderson & Dahlin 2014, pp. 195–196.
  20. ^ Anderson & Dahlin 2014, p. 206.
  21. ^ a b Anderson & Dahlin 2014, p. 261.
  22. ^ Anderson & Dahlin 2014, p. 262.
  23. ^ Tanenbaum & Bos 2023, pp. 449–450.
  24. ^ Tanenbaum & Bos 2023, p. 455.
  25. ^ Tanenbaum & Bos 2023, p. 454.
  26. ^ Tanenbaum & Bos 2023, pp. 454–455.
  27. ^ Tanenbaum & Bos 2023, pp. 459, 461.
  28. ^ Tanenbaum & Bos 2023, pp. 465–466.

Reason: fix unsourced text and ensure that topics are covered according to their prominence in reliable sources (please see the summary of several OS textbooks on my sandbox talk page).

Thank you Buidhe paid (talk) 19:30, 3 February 2024 (UTC)[reply]

Edit request 5

Please replace the current "Disk access and file systems" and "Disk drivers" sections with the following text under the heading "File system":

Extended content
File systems allow users and programs to organize and sort files on a computer, often through the use of directories (or folders).

Permanent storage devices used in twenty-first century computers, unlike volatile dynamic random-access memory (DRAM), are still accessible after a crash or power failure. Permanent (non-volatile) storage is much cheaper per byte, but takes several orders of magnitude longer to access, read, and write.[1][2] The two main technologies are a hard drive consisting of magnetic disks, and flash memory (a solid state drive that stores data in electrical circuits). The latter is more expensive but faster and more durable.[3][4]

File systems are an abstraction used by the operating system to simplify access to permanent storage. They provide human-readable filenames and other metadata, increase performance via amortization of accesses, prevent multiple threads from accessing the same section of memory, and include checksums to identify corruption.[5] File systems are composed of files (named collections of data, of an arbitrary size) and directories (also called folders) that list human-readable filenames and other directories.[6] An absolute file path begins at the root directory and lists subdirectories divided by punctuation, while a relative path defines the location of a file from a directory.[7][8]

System calls (which are sometimes wrapped by libraries) enable applications to create, delete, open, and close files, as well as link, read, and write to them. All these operations are carried out by the operating system on behalf of the application.[9] The operating system's efforts to reduce latency include storing recently requested blocks of memory in a cache and prefetching data that the application has not asked for, but might need next.[10] Device drivers are software specific to each input/output (I/O) device that enables the operating system to work without modification over different hardware.[11][12]

Another component of file systems is a dictionary that maps a file's name and metadata to the data block where its contents are stored.[13] Most file systems use directories to convert file names to file numbers. To find the block number, the operating system uses an index (often implemented as a tree).[14] Separately, there is a free space map to track free blocks, commonly implemented as a bitmap.[14] Although any free block can be used to store a new file, many operating systems try to group together files in the same directory to maximize performance, or periodically reorganize files to reduce fragmentation.[15]

Maintaining data reliability in the face of a computer crash or hardware failure is another concern.[16] File writing protocols are designed with atomic operations so as not to leave permanent storage in a partially written, inconsistent state in the event of a crash at any point during writing.[17] Data corruption is addressed by redundant storage (for example, RAID—redundant array of inexpensive disks)[18][19] and checksums to detect when data has been corrupted. With multiple layers of checksums and backups of a file, a system can recover from multiple hardware failures. Background processes are often used to detect and recover from data corruption.[19]

References

  1. ^ Anderson & Dahlin 2014, pp. 492, 517.
  2. ^ Tanenbaum & Bos 2023, pp. 259–260.
  3. ^ Anderson & Dahlin 2014, pp. 517, 530.
  4. ^ Tanenbaum & Bos 2023, p. 260.
  5. ^ Anderson & Dahlin 2014, pp. 492–493.
  6. ^ Anderson & Dahlin 2014, p. 496.
  7. ^ Anderson & Dahlin 2014, pp. 496–497.
  8. ^ Tanenbaum & Bos 2023, pp. 274–275.
  9. ^ Anderson & Dahlin 2014, pp. 502–504.
  10. ^ Anderson & Dahlin 2014, p. 507.
  11. ^ Anderson & Dahlin 2014, p. 508.
  12. ^ Tanenbaum & Bos 2023, p. 359.
  13. ^ Anderson & Dahlin 2014, p. 545.
  14. ^ a b Anderson & Dahlin 2014, p. 546.
  15. ^ Anderson & Dahlin 2014, p. 547.
  16. ^ Anderson & Dahlin 2014, pp. 589, 591.
  17. ^ Anderson & Dahlin 2014, pp. 591–592.
  18. ^ Tanenbaum & Bos 2023, pp. 385–386.
  19. ^ a b Anderson & Dahlin 2014, p. 592.

Reason: add sources, improve high-level explanation, harmonize coverage proprortionate to reliable sources. Giving disk drivers a separate section seems UNDUE given that they are only a couple paragraphs in some of the text books (A&D, Silberschatz et al.) and given no more than two pages (in Tanenbaum). Buidhe paid (talk) 00:41, 4 February 2024 (UTC)[reply]

Edit request 6

Please replace the content of the "Memory managment" and "Virtual memory" sections, after the hatnote under "Memory management", with: (note that the virtual memory section in my version is a subheading of "memory management")

Extended content

Memory hierarchy is the principle that a computer has multiple stocks of memory, from expensive, volatile (not retaining information in case of power shutoff), and fast cache memory, to less expensive, volatile, and slower main memory, and finally most of the computer's storage in the form of nonvolatile (persistent) and inexpensive, but less quickly accessed solid-state drive or magnetic disk.[1] The memory manager is the part of the operating system that manages volatile memory.[1] Cache memory is typically managed by hardware, while main memory is typically managed by software.[2]

Early computers had no virtual addresses. Multiple programs could not be loaded in memory at the same time, so during a context switch the entire contents of memory would be saved to nonvolatile storage, then the next program loaded in.[2] Virtual address space provided increased security by preventing applications from overwriting memory needed by the operating system or other processes[3][4] and enabled multiple processes to run simultaneously.[5] Virtual address space creates the illusion of nearly unlimited memory available to each process, even exceeding the hardware memory.[6]

Address translation is the process by which virtual addresses are converted into physical ones by the memory management unit (MMU).[7][8] To cope with the increasing amounts of memory and storage in modern computers, the MMU often contains a multi-level page table that can resolve any address along with a translation lookaside buffer (TLB) that caches the latest memory lookups for increased speed.[9] As part of address translation, the MMU prevents a process from accessing memory in use by another process (memory protection).[10]

Virtual memory

Illustration of one process using memory segmentation

Often the amount of memory requested by processes will exceed the computer's total memory.[11] One strategy is that after a process runs for a while, it will be put on idle and its memory swapped to permanent storage. Then, the memory can be reused for another process.[12] The downside of this approach is that over time the physical memory becomes fragmented because not all processes use the same amount of physical address space.[13] Also, the user may want to run a process too large to fit in memory.[14] Free blocks are tracked either with bitmaps or free lists.[15]

The most common option of managing overflow from memory is dividing each process' memory usage into segments called pages.[14] All of the memory is backed up in disk storage, [16] and not all of the process' pages need to be in memory for execution to go ahead.[14] If the process requests an address that is not currently in physical memory (page fault), the operating system will fetch the page and resume operation.[8]

References

  1. ^ a b Tanenbaum & Bos 2023, p. 179.
  2. ^ a b Tanenbaum & Bos 2023, p. 180.
  3. ^ Tanenbaum & Bos 2023, p. 183.
  4. ^ Anderson & Dahlin 2014, pp. 371–372, 414.
  5. ^ Tanenbaum & Bos 2023, pp. 183–184.
  6. ^ Anderson & Dahlin 2014, pp. 425, 454.
  7. ^ Anderson & Dahlin 2014, p. 371.
  8. ^ a b Tanenbaum & Bos 2023, p. 193.
  9. ^ Anderson & Dahlin 2014, p. 414.
  10. ^ Silberschatz et al. 2018, p. 357.
  11. ^ Tanenbaum & Bos 2023, p. 185.
  12. ^ Tanenbaum & Bos 2023, p. 186.
  13. ^ Tanenbaum & Bos 2023, p. 187.
  14. ^ a b c Tanenbaum & Bos 2023, p. 192.
  15. ^ Tanenbaum & Bos 2023, p. 188.
  16. ^ Anderson & Dahlin 2014, p. 454.

Reason: Add sources, more closely harmonize the amount of detail for each subtopic with the amount of coverage in reliable sources Buidhe paid (talk) 06:26, 4 February 2024 (UTC)[reply]

Edit request 6

Please replace the current content of the "User interface" section, after the hatnote and the image, with the following text:

Extended content

On personal computers, user input typically comes from a keyboard, mouse, trackpads, and/or touchscreen, which are connected to the operating system with specialized software.[1] Programmers often prefer output in the form of plain text, which is simple to support.[2] In contrast, other users often prefer graphical user interfaces (GUIs), which are supported by most PCs.[3] GUIs may be implemented with user-level code or by the operating system itself, and the software to support it is much more complex. They are also supported by specialized hardware in the form of a graphics card that usually contains a graphics processing unit (GPU).[4]

References

  1. ^ Tanenbaum & Bos 2023, pp. 396, 402.
  2. ^ Tanenbaum & Bos 2023, p. 402.
  3. ^ Tanenbaum & Bos 2023, pp. 395, 408.
  4. ^ Tanenbaum & Bos 2023, p. 409.

Reason: the current section is UNDUE, as major operating systems textbooks lack a top-level chapter about user interface, and cover the topic briefly if at all. My version exploits summary style to improve conciseness, and also resolves the issue of uncited text. Buidhe paid (talk) 06:16, 5 February 2024 (UTC)[reply]

Edit request 7

Please remove the unsourced section "Networking". Reason: only one of the operating systems textbooks has a section on networking. I checked the source and it is a brief overview of networking in general, and does not cover how operating systems support networking (which makes up the current content of the section). Thus, I believe the section should be removed both for verifiability reasons as well as for being UNDUE. Buidhe paid (talk) 06:29, 5 February 2024 (UTC)[reply]

Edit request 8

Please replace the current content of the "History" section, including the hatnote, with:

Extended content
An IBM System 360/65 Operator's Panel. OS/360 was used on most IBM mainframe computers beginning in 1966.

The first computers in the late 1940s and 1950s were directly programmed in machine code inputted via plugboards or punch cards, without programming languages or operating systems.[1] After the introduction of the transistor in the mid-1950s, mainframes began to be built. These still needed professional operators[1] but had rudimentary operating systems such as Fortran Monitor System (FMS) and IBSYS.[2] In the 1960s, IBM introduced the first series of intercompatible computers (System/360). All of them ran the same operating system—OS/360—which consisted of millions of lines of assembly language that had thousands of bugs. The OS/360 also was the first to support multiprogramming, such that the CPU could be put to use on one job while another was waiting on input/output (I/O). Holding multiple jobs in memory necessitated memory partitioning and safeguards against one job accessing the memory allocated to a different one.[3]

Around the same time, terminals were invented so multiple users could access the computer simultaneously. The operating system MULTICS was intended to allow hundreds of users to access a large computer. Despite its limited adoption, it can be considered the precursor to cloud computing. The UNIX operating system originated as a development of MULTICS for a single user.[4] Because UNIX's source code was available, it became the basis of other, incompatible operating systems, of which the most successful were AT&T's System V and the University of California's Berkeley Software Distribution (BSD).[5] To increase compatibility, the IEEE released the POSIX standard for system calls, which is supported by most UNIX systems. MINIX was a stripped-down version of UNIX, developed in 1987 for educational uses, that served as the basis for the commercially available, free software Linux. Since 2008, MINIX is used in controllers of all Intel microchips, while Linux is widespread in data centers and Android smartphones.[6]

Microcomputers

Command-line interface of the MS-DOS operating system
Graphical user interface of a Macintosh

The invention of large scale integration enabled the production of personal computers (initially called microcomputers) from around 1980.[7] For around five years, the CP/M (Control Program for Microcomputers) was the most popular operating system for microcomputers.[8] Later, IBM bought the DOS (Disk Operating System) from Bill Gates. After modifications requested by IBM, the resulting system was called MS-DOS (MicroSoft Disk Operating System) and was widely used on IBM microcomputers. Later versions increased their sophistication, in part by borrowing features from UNIX.[8]

Steve Jobs' Macintosh, which used the UNIX-based (via FreeBSD)[9] macOS, was the first popular computer to use a graphical user interface (GUI). The GUI proved much more user friendly than the text-only command-line interface earlier operating systems had used. Following the success of Macintosh, MS-DOS was updated with a GUI overlay called Windows. Windows later was rewritten as a stand-alone operating system, borrowing so many features from another (VAX VMS) that a large legal settlement was paid.[10] In the twenty-first century, Windows continues to be popular on personal computers but has less market share of servers. UNIX operating systems, especially Linux, are the most popular on enterprise systems and servers but are also used on mobile devices and many other computer systems.[11]

On mobile devices, Symbian OS was dominant at first, being usurped by BlackBerry OS (introduced 2002) and iOS for iPhones (from 2007). Later on, the open-source, UNIX-based Android (introduced 2008) became most popular.[12]

References

  1. ^ a b Tanenbaum & Bos 2023, p. 8.
  2. ^ Tanenbaum & Bos 2023, p. 10.
  3. ^ Tanenbaum & Bos 2023, pp. 11–12.
  4. ^ Tanenbaum & Bos 2023, pp. 13–14.
  5. ^ Tanenbaum & Bos 2023, pp. 14–15.
  6. ^ Tanenbaum & Bos 2023, p. 15.
  7. ^ Tanenbaum & Bos 2023, pp. 15–16.
  8. ^ a b Tanenbaum & Bos 2023, p. 16.
  9. ^ Tanenbaum & Bos 2023, pp. 17–18.
  10. ^ Tanenbaum & Bos 2023, p. 17.
  11. ^ Tanenbaum & Bos 2023, p. 18.
  12. ^ Tanenbaum & Bos 2023, pp. 19–20.

Reasons: make it more concise, use summary style, fix uncited text Buidhe paid (talk) 06:58, 6 February 2024 (UTC)[reply]

Edit request 9

Please replace the current sections "Examples" and "Market share" with one section called "Popular operating systems", with the following content:

Extended content

In the personal computer market, as of September 2023, Microsoft Windows has the highest market share, around 68%. macOS by Apple Inc. is in second place (20%), and the varieties of Linux, including ChromeOS, are collectively in third place (7%).[1] In the mobile sector (including smartphones and tablets), as of September 2023, Android's share is 68.92%, followed by Apple's iOS and iPadOS with 30.42%, and other operating systems with .66%.[2]

Linux

Layers of a Linux system

Linux is a free software distributed under the GNU General Public License (GPL), which means that all of its derivatives are legally required to release their source code.[3] Linux was designed by programmers for their own use, thus emphasizing simplicity and consistency, with a small number of basic elements that can be combined in nearly unlimited ways, and avoiding redundancy.[4]

Its design is similar to other UNIX systems not using a microkernel.[5] It is written in C[6] and uses UNIX System V syntax, but also supports BSD syntax. Linux supports standard UNIX networking features, as well as the full suite of UNIX tools, while supporting multiple users and employing preemptive multitasking. Initially of a minimalist design, Linux is a flexible system that can work in under 16 MB of RAM, but still is used on large multiprocessor systems.[5] Similar to other UNIX systems, Linux distributions are composed of a kernel, system libraries, and system utilities.[7] Linux has a graphical user interface (GUI) with a desktop, folder and file icons, as well as the option to access the operating system via a command line.[8]

Android is a partially open-source operating system closely based on Linux and has become the most widely used operating system by users, due to its popularity on smartphones and, to a lesser extent, embedded systems needing a GUI, such as "smart watches, automotive dashboards, airplane seatbacks, medical devices, and home appliances".[9] Unlike Linux, much of Android is written in Java and uses object-oriented design.[10]

Microsoft Windows

Security descriptor for a file that is read-only by default, specified no access for Elvis, read/write access for Cathy, and full access for Ida, the owner of the file[11]

Windows is a proprietary operating system that is widely used on desktop computers, laptops, tablets, phones, workstations, enterprise servers, and Xbox consoles.[12] The operating system was designed for "security, reliability, compatibility, high performance, extensibility, portability, and international support"—later on, energy efficiency and support for dynamic devices also became priorities.[13]

Windows Executive works via kernel-mode objects for important data structures like processes, threads, and sections (memory objects, for example files).[14] The operating system supports demand paging of virtual memory, which speeds up I/O for many applications. I/O device drivers use the Windows Driver Model.[14] The NTFS file system has a master table and each file is represented as an record with metadata.[15] The scheduling includes preemptive multitasking.[16] Windows has many security features;[17] especially important are the use of access-control lists and integrity levels. Every process has an authentication token and each object is given a security descriptor. Later releases have added even more security features.[15]

References

  1. ^ "Desktop Operating System Market Share Worldwide". StatCounter Global Stats. Archived from the original on 2 October 2023. Retrieved 2023-10-03.
  2. ^ "Mobile & Tablet Operating System Market Share Worldwide". StatCounter Global Stats. Retrieved 2023-10-02.
  3. ^ Silberschatz et al. 2018, pp. 779–780.
  4. ^ Tanenbaum & Bos 2023, pp. 713–714.
  5. ^ a b Silberschatz et al. 2018, p. 780.
  6. ^ Vaughan-Nichols, Steven (2022). "Linus Torvalds prepares to move the Linux kernel to modern C". ZDNET. Retrieved 7 February 2024.
  7. ^ Silberschatz et al. 2018, p. 781.
  8. ^ Tanenbaum & Bos 2023, pp. 715–716.
  9. ^ Tanenbaum & Bos 2023, pp. 793–794.
  10. ^ Tanenbaum & Bos 2023, p. 793.
  11. ^ Tanenbaum & Bos 2023, pp. 1021–1022.
  12. ^ Tanenbaum & Bos 2023, p. 871.
  13. ^ Silberschatz et al. 2018, p. 826.
  14. ^ a b Tanenbaum & Bos 2023, p. 1035.
  15. ^ a b Tanenbaum & Bos 2023, p. 1036.
  16. ^ Silberschatz et al. 2018, p. 821.
  17. ^ Silberschatz et al. 2018, p. 827.

Reason: The only two OS textbooks with case studies have Linux and Windows, so if we're going to include a section with specific examples, that's probably the ones that should be there. This is a top level article and information about specific operating systems likely belongs in their own article or other subarticles such as comparison of operating systems. My version improves summary style and also fixes unsourced content issues. Buidhe paid (talk) 04:00, 7 February 2024 (UTC)[reply]

Edit request 10

Please remove the unsourced "modes" section and replace the first paragraph of the "Kernel" section with the following text, which also covers modes:

Extended content

The kernel is the part of the operating system that provides protection between different applications and users. This protection is key to improving reliability by keeping errors isolated to one program, as well as security by limiting the power of malicious software and protecting private data, and ensuring that one program cannot monopolize the computer's resources.[1] Most operating systems have two modes of operation:[2] in user mode, the hardware checks that the software is only executing legal instructions, whereas the kernel has unrestricted powers and is not subject to these checks.[3] The kernel also manages memory for other processes and controls access to input/output devices.[4]

References

  1. ^ Anderson & Dahlin 2014, pp. 39–40.
  2. ^ Tanenbaum & Bos 2023, p. 2.
  3. ^ Anderson & Dahlin 2014, pp. 41, 45.
  4. ^ Anderson & Dahlin 2014, pp. 52–53.

Thanks Buidhe paid (talk) 07:09, 14 February 2024 (UTC)[reply]

I believe that it would be better to add sources to the existing text: some processors have more than two modes. -- Shmuel (Seymour J.) Metz Username:Chatul (talk) 14:00, 14 February 2024 (UTC)[reply]
I updated the text to mention that some OS have a different number of modes. However, according to Tanenbaum, most OS have two modes, so going into detail on other mode systems is likely UNDUE. The current text of the modes section is excessive detail for this article compared to the coverage of user/kernel/other modes in OS textbooks (just a couple paragraphs out of hundreds or 1000+ pages in those I consulted). Buidhe paid (talk) 04:51, 15 February 2024 (UTC)[reply]