SlideShare a Scribd company logo
Operating System 08
Multi-processing Time sharing and
Multitasking OS
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Multiprogramming Operating
System
• The objective of a multiprogramming operating system is to increase
the system utilization efficiency.
• The batch processing system tries to reduce the CPU idle time
through operator interaction. However, it cannot reduce the idle time
due to IO operations.
• So, when some IO is being performed by the currently executing job
of a batch, the CPU sits idle without any work to do.
• Thus, the multiprogramming operating system tries to eliminate such
idle times by providing multiple computational tasks for the CPU to
perform.
• This is achieved by keeping multiple jobs in the main store.
• So, when the job that is being currently executed on the CPU needs
some IO, the CPU passes its requirement over to the IO processor.
• Till the time the IO operation is being carried out, the CPU is free
to carry out some other job.
Time Sharing or Multitasking
System
• Time sharing, or multitasking, is a logical extension
of multiprogramming.
• Multiple jobs are executed by the CPU switching
between them, but the switches occur so frequently
that the users may interact with each program
while it is running.
• An interactive, or hands-on, computer system
provides on-line communication between the user
and the system.
• The user gives instructions to the operating system
or to a program directly, and receives an
immediate response.
Time Sharing or Multitasking
System : File Management
• If users are to be able to access both data and code
conveniently, an on-line file system must be available. A
file is a collection of related information defined by its
creator.
• Commonly, files represent programs (both source and
object forms) and data.
• The operating system implements the abstract concept
of a file by managing mass-storage devices, such disks.
• Files are normally organized into logical clusters, or
directories, which make them easier to locate and
access.
• Since multiple users have access to files, it is desirable
to control by whom and in what ways files may be
accessed.
Time Sharing or Multitasking
System : Interactive jobs
• Batch systems are appropriate for executing large jobs that
need little interaction.
• The user can submit jobs and return later for the results; it is
not necessary for the user to wait while the job is processed.
• Interactive jobs tend to be composed of many short actions,
where the results of the next command may be unpredictable.
• The user submits the command and then waits for the
results. Accordingly, the response time should be short—on
the order of seconds at most.
• An interactive system is used when a short response time is
required.
• Time-sharing systems were developed to provide interactive
use of a computer system at a reasonable cost.
• A time-shared operating system uses CPU scheduling and
multiprogramming to provide each user with a small portion of
a time-shared computer.
Time Sharing or Multitasking
System : Process Management
• Each user has at least one separate program in
memory.
• A program that is loaded into memory and is executing
is commonly referred to as a process.
• When a process executes, it typically executes for only
a short time before it either finishes or needs to
perform I/O.
• I/O may be interactive; that is, output is to a display for
the user and input is from a user keyboard.
• A time-shared operating system allows the many users
to share the computer simultaneously.
• Since each action or command in a time-shared system
tends to be short, only a little CPU time is needed for
each user.
Time Sharing or Multitasking
System : Memory Management
• Time-sharing operating systems are even more complex
than are multi-programmed operating systems.
• As in multiprogramming, several jobs must be kept
simultaneously in memory, which requires some form of
memory management and protection.
• So that a reasonable response time can be obtained,
jobs may have to be swapped in and out of main
memory.
• As the system switches rapidly from one user to the
next, each user is given the impression that she has
her own computer, whereas actually one computer is
being shared among many users.
Multi- Processing or Parallel
Systems
• Most systems to date are single-processor systems; that
is, they have only one main CPU. However, there is a
trend toward multiprocessor systems.
• Such systems have more than one processor in close
communication, sharing the computer bus, the clock,
and sometimes memory and peripheral devices.
• These systems are referred to as tightly coupled
systems.
• There are several reasons for building such systems
such as increased throughput, lower cost, increased
reliability, fault tolerance.
• The Tandem system uses both hardware and software
duplication to ensure continued operation despite faults
Multiprogramming Vs
Multiprocessing Vs Multitasking
• The words multiprogramming, multiprocessing and multitasking are often
confused. There are, of course, some distinctions between these similar, but
distinct terms.
The term multiprogramming refers to the situation in which a single CPU divides
its time between more than one job. Time sharing is a special case of
multiprogramming, where a single CPU serves a number of users at interactive
terminals.
In multiprocessing, multiple CPUs perform more than one job at one time.
Multiprogramming and multiprocessing are not mutually exclusive. Some
mainframes and supermini computers have multiple CPUs each of which can
juggle several jobs.
The term multitasking is described any system that runs or appears to run more
than one application program one time. An effective multitasking environment
must provide many services both to the user and to the application program it
runs. The most important of these are resource management which divides the
computers time, memory and peripheral devices among competing tasks and
interprocess communication, which lets tasking coordinate their activities by
exchanging information
Assignment
• Explain Time sharing Operating Systems
• Briefly describe multi programming and multi-
processing OS
Ad

More Related Content

What's hot (20)

Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
myrajendra
 
Process synchronization in Operating Systems
Process synchronization in Operating SystemsProcess synchronization in Operating Systems
Process synchronization in Operating Systems
Ritu Ranjan Shrivastwa
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
chameli devi group of institutions
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
Harshad Umredkar
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
udaya khanal
 
program partitioning and scheduling IN Advanced Computer Architecture
program partitioning and scheduling  IN Advanced Computer Architectureprogram partitioning and scheduling  IN Advanced Computer Architecture
program partitioning and scheduling IN Advanced Computer Architecture
Pankaj Kumar Jain
 
Input output hardware of operating system
Input output hardware of operating systemInput output hardware of operating system
Input output hardware of operating system
RohitYadav633
 
Mainframe systems
Mainframe systemsMainframe systems
Mainframe systems
V.V.Vanniaperumal College for Women
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
Student
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
vanamali_vanu
 
Threads (operating System)
Threads (operating System)Threads (operating System)
Threads (operating System)
Prakhar Maurya
 
Scheduling
SchedulingScheduling
Scheduling
pradeepa velmurugan
 
Database System Architectures
Database System ArchitecturesDatabase System Architectures
Database System Architectures
Information Technology
 
Interprocess communication (IPC) IN O.S
Interprocess communication (IPC) IN O.SInterprocess communication (IPC) IN O.S
Interprocess communication (IPC) IN O.S
Hussain Ala'a Alkabi
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
Kumar Pritam
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
Mohammad Alam
 
Sequential consistency model
Sequential consistency modelSequential consistency model
Sequential consistency model
Bharathi Lakshmi Pon
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
Piyush Rochwani
 
Election algorithms
Election algorithmsElection algorithms
Election algorithms
Ankush Kumar
 
operating system structure
operating system structureoperating system structure
operating system structure
Waseem Ud Din Farooqui
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
myrajendra
 
Process synchronization in Operating Systems
Process synchronization in Operating SystemsProcess synchronization in Operating Systems
Process synchronization in Operating Systems
Ritu Ranjan Shrivastwa
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
Harshad Umredkar
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
udaya khanal
 
program partitioning and scheduling IN Advanced Computer Architecture
program partitioning and scheduling  IN Advanced Computer Architectureprogram partitioning and scheduling  IN Advanced Computer Architecture
program partitioning and scheduling IN Advanced Computer Architecture
Pankaj Kumar Jain
 
Input output hardware of operating system
Input output hardware of operating systemInput output hardware of operating system
Input output hardware of operating system
RohitYadav633
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
Student
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
vanamali_vanu
 
Threads (operating System)
Threads (operating System)Threads (operating System)
Threads (operating System)
Prakhar Maurya
 
Interprocess communication (IPC) IN O.S
Interprocess communication (IPC) IN O.SInterprocess communication (IPC) IN O.S
Interprocess communication (IPC) IN O.S
Hussain Ala'a Alkabi
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
Kumar Pritam
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
Mohammad Alam
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
Piyush Rochwani
 
Election algorithms
Election algorithmsElection algorithms
Election algorithms
Ankush Kumar
 

Similar to Operating system 08 time sharing and multitasking operating system (20)

Operating system concepts
Operating system conceptsOperating system concepts
Operating system concepts
Arnav Chowdhury
 
TYPES-OF-OSvnxbjxgjsjgsgjsgj gjzutsugsugsgussgj.pdf
TYPES-OF-OSvnxbjxgjsjgsgjsgj gjzutsugsugsgussgj.pdfTYPES-OF-OSvnxbjxgjsjgsgjsgj gjzutsugsugsgussgj.pdf
TYPES-OF-OSvnxbjxgjsjgsgjsgj gjzutsugsugsgussgj.pdf
abhishekknpsingh7
 
Types of operating system.................
Types of operating system.................Types of operating system.................
Types of operating system.................
harendersin82880
 
OperatingSystemFeature.pptx
OperatingSystemFeature.pptxOperatingSystemFeature.pptx
OperatingSystemFeature.pptx
CharuJain396881
 
Os notes 1_5
Os notes 1_5Os notes 1_5
Os notes 1_5
NagarajMatheswaran
 
os unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systemsos unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systems
ssuser6aef00
 
Operating System-adi.pdf
Operating System-adi.pdfOperating System-adi.pdf
Operating System-adi.pdf
Prof. Dr. K. Adisesha
 
Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2
Ismail Mukiibi
 
Operating System
Operating SystemOperating System
Operating System
Hitesh Mohapatra
 
1. Introduction to OS.ppt
1. Introduction to OS.ppt1. Introduction to OS.ppt
1. Introduction to OS.ppt
SATHYABAMAMADHANKUMA
 
LECTURE 2 OPERATING SYSTEM PPT FOR ENGINEERING
LECTURE 2 OPERATING SYSTEM PPT FOR ENGINEERINGLECTURE 2 OPERATING SYSTEM PPT FOR ENGINEERING
LECTURE 2 OPERATING SYSTEM PPT FOR ENGINEERING
MANASVINANDAL
 
Unit 4 Real Time Operating System
Unit 4 Real Time Operating SystemUnit 4 Real Time Operating System
Unit 4 Real Time Operating System
Dr. Pankaj Zope
 
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptxUNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
LeahRachael
 
4-Process control block.pptx
4-Process control block.pptx4-Process control block.pptx
4-Process control block.pptx
sania458451
 
4-Process control block.pptx
4-Process control block.pptx4-Process control block.pptx
4-Process control block.pptx
sania458451
 
Unit I OS.pdf
Unit I OS.pdfUnit I OS.pdf
Unit I OS.pdf
UmaYadav45
 
Evolution, Strutcture and Operations.pptx
Evolution, Strutcture and Operations.pptxEvolution, Strutcture and Operations.pptx
Evolution, Strutcture and Operations.pptx
ssuser000e54
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
THEFPS
 
Introduction to operating systems
 Introduction to operating systems Introduction to operating systems
Introduction to operating systems
Kumbirai Junior Muzavazi
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
Operating system concepts
Operating system conceptsOperating system concepts
Operating system concepts
Arnav Chowdhury
 
TYPES-OF-OSvnxbjxgjsjgsgjsgj gjzutsugsugsgussgj.pdf
TYPES-OF-OSvnxbjxgjsjgsgjsgj gjzutsugsugsgussgj.pdfTYPES-OF-OSvnxbjxgjsjgsgjsgj gjzutsugsugsgussgj.pdf
TYPES-OF-OSvnxbjxgjsjgsgjsgj gjzutsugsugsgussgj.pdf
abhishekknpsingh7
 
Types of operating system.................
Types of operating system.................Types of operating system.................
Types of operating system.................
harendersin82880
 
OperatingSystemFeature.pptx
OperatingSystemFeature.pptxOperatingSystemFeature.pptx
OperatingSystemFeature.pptx
CharuJain396881
 
os unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systemsos unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systems
ssuser6aef00
 
Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2
Ismail Mukiibi
 
LECTURE 2 OPERATING SYSTEM PPT FOR ENGINEERING
LECTURE 2 OPERATING SYSTEM PPT FOR ENGINEERINGLECTURE 2 OPERATING SYSTEM PPT FOR ENGINEERING
LECTURE 2 OPERATING SYSTEM PPT FOR ENGINEERING
MANASVINANDAL
 
Unit 4 Real Time Operating System
Unit 4 Real Time Operating SystemUnit 4 Real Time Operating System
Unit 4 Real Time Operating System
Dr. Pankaj Zope
 
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptxUNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
LeahRachael
 
4-Process control block.pptx
4-Process control block.pptx4-Process control block.pptx
4-Process control block.pptx
sania458451
 
4-Process control block.pptx
4-Process control block.pptx4-Process control block.pptx
4-Process control block.pptx
sania458451
 
Evolution, Strutcture and Operations.pptx
Evolution, Strutcture and Operations.pptxEvolution, Strutcture and Operations.pptx
Evolution, Strutcture and Operations.pptx
ssuser000e54
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
THEFPS
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
Ad

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 
Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 
Ad

Recently uploaded (20)

Do not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your causeDo not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your cause
Fexle Services Pvt. Ltd.
 
Buy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training techBuy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training tech
Rustici Software
 
Unit Two - Java Architecture and OOPS
Unit Two  -   Java Architecture and OOPSUnit Two  -   Java Architecture and OOPS
Unit Two - Java Architecture and OOPS
Nabin Dhakal
 
The Elixir Developer - All Things Open
The Elixir Developer - All Things OpenThe Elixir Developer - All Things Open
The Elixir Developer - All Things Open
Carlo Gilmar Padilla Santana
 
Adobe Audition Crack FRESH Version 2025 FREE
Adobe Audition Crack FRESH Version 2025 FREEAdobe Audition Crack FRESH Version 2025 FREE
Adobe Audition Crack FRESH Version 2025 FREE
zafranwaqar90
 
Time Estimation: Expert Tips & Proven Project Techniques
Time Estimation: Expert Tips & Proven Project TechniquesTime Estimation: Expert Tips & Proven Project Techniques
Time Estimation: Expert Tips & Proven Project Techniques
Livetecs LLC
 
A Comprehensive Guide to CRM Software Benefits for Every Business Stage
A Comprehensive Guide to CRM Software Benefits for Every Business StageA Comprehensive Guide to CRM Software Benefits for Every Business Stage
A Comprehensive Guide to CRM Software Benefits for Every Business Stage
SynapseIndia
 
How to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryErrorHow to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryError
Tier1 app
 
How to Install and Activate ListGrabber Plugin
How to Install and Activate ListGrabber PluginHow to Install and Activate ListGrabber Plugin
How to Install and Activate ListGrabber Plugin
eGrabber
 
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdfTop Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
evrigsolution
 
How I solved production issues with OpenTelemetry
How I solved production issues with OpenTelemetryHow I solved production issues with OpenTelemetry
How I solved production issues with OpenTelemetry
Cees Bos
 
Deploying & Testing Agentforce - End-to-end with Copado - Ewenb Clark
Deploying & Testing Agentforce - End-to-end with Copado - Ewenb ClarkDeploying & Testing Agentforce - End-to-end with Copado - Ewenb Clark
Deploying & Testing Agentforce - End-to-end with Copado - Ewenb Clark
Peter Caitens
 
sequencediagrams.pptx software Engineering
sequencediagrams.pptx software Engineeringsequencediagrams.pptx software Engineering
sequencediagrams.pptx software Engineering
aashrithakondapalli8
 
Best HR and Payroll Software in Bangladesh - accordHRM
Best HR and Payroll Software in Bangladesh - accordHRMBest HR and Payroll Software in Bangladesh - accordHRM
Best HR and Payroll Software in Bangladesh - accordHRM
accordHRM
 
Mastering Selenium WebDriver: A Comprehensive Tutorial with Real-World Examples
Mastering Selenium WebDriver: A Comprehensive Tutorial with Real-World ExamplesMastering Selenium WebDriver: A Comprehensive Tutorial with Real-World Examples
Mastering Selenium WebDriver: A Comprehensive Tutorial with Real-World Examples
jamescantor38
 
Solar-wind hybrid engery a system sustainable power
Solar-wind  hybrid engery a system sustainable powerSolar-wind  hybrid engery a system sustainable power
Solar-wind hybrid engery a system sustainable power
bhoomigowda12345
 
From Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
From Vibe Coding to Vibe Testing - Complete PowerPoint PresentationFrom Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
From Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
Shay Ginsbourg
 
Beyond the code. Complexity - 2025.05 - SwiftCraft
Beyond the code. Complexity - 2025.05 - SwiftCraftBeyond the code. Complexity - 2025.05 - SwiftCraft
Beyond the code. Complexity - 2025.05 - SwiftCraft
Dmitrii Ivanov
 
Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??
Web Designer
 
Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025
Web Designer
 
Do not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your causeDo not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your cause
Fexle Services Pvt. Ltd.
 
Buy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training techBuy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training tech
Rustici Software
 
Unit Two - Java Architecture and OOPS
Unit Two  -   Java Architecture and OOPSUnit Two  -   Java Architecture and OOPS
Unit Two - Java Architecture and OOPS
Nabin Dhakal
 
Adobe Audition Crack FRESH Version 2025 FREE
Adobe Audition Crack FRESH Version 2025 FREEAdobe Audition Crack FRESH Version 2025 FREE
Adobe Audition Crack FRESH Version 2025 FREE
zafranwaqar90
 
Time Estimation: Expert Tips & Proven Project Techniques
Time Estimation: Expert Tips & Proven Project TechniquesTime Estimation: Expert Tips & Proven Project Techniques
Time Estimation: Expert Tips & Proven Project Techniques
Livetecs LLC
 
A Comprehensive Guide to CRM Software Benefits for Every Business Stage
A Comprehensive Guide to CRM Software Benefits for Every Business StageA Comprehensive Guide to CRM Software Benefits for Every Business Stage
A Comprehensive Guide to CRM Software Benefits for Every Business Stage
SynapseIndia
 
How to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryErrorHow to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryError
Tier1 app
 
How to Install and Activate ListGrabber Plugin
How to Install and Activate ListGrabber PluginHow to Install and Activate ListGrabber Plugin
How to Install and Activate ListGrabber Plugin
eGrabber
 
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdfTop Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
evrigsolution
 
How I solved production issues with OpenTelemetry
How I solved production issues with OpenTelemetryHow I solved production issues with OpenTelemetry
How I solved production issues with OpenTelemetry
Cees Bos
 
Deploying & Testing Agentforce - End-to-end with Copado - Ewenb Clark
Deploying & Testing Agentforce - End-to-end with Copado - Ewenb ClarkDeploying & Testing Agentforce - End-to-end with Copado - Ewenb Clark
Deploying & Testing Agentforce - End-to-end with Copado - Ewenb Clark
Peter Caitens
 
sequencediagrams.pptx software Engineering
sequencediagrams.pptx software Engineeringsequencediagrams.pptx software Engineering
sequencediagrams.pptx software Engineering
aashrithakondapalli8
 
Best HR and Payroll Software in Bangladesh - accordHRM
Best HR and Payroll Software in Bangladesh - accordHRMBest HR and Payroll Software in Bangladesh - accordHRM
Best HR and Payroll Software in Bangladesh - accordHRM
accordHRM
 
Mastering Selenium WebDriver: A Comprehensive Tutorial with Real-World Examples
Mastering Selenium WebDriver: A Comprehensive Tutorial with Real-World ExamplesMastering Selenium WebDriver: A Comprehensive Tutorial with Real-World Examples
Mastering Selenium WebDriver: A Comprehensive Tutorial with Real-World Examples
jamescantor38
 
Solar-wind hybrid engery a system sustainable power
Solar-wind  hybrid engery a system sustainable powerSolar-wind  hybrid engery a system sustainable power
Solar-wind hybrid engery a system sustainable power
bhoomigowda12345
 
From Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
From Vibe Coding to Vibe Testing - Complete PowerPoint PresentationFrom Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
From Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
Shay Ginsbourg
 
Beyond the code. Complexity - 2025.05 - SwiftCraft
Beyond the code. Complexity - 2025.05 - SwiftCraftBeyond the code. Complexity - 2025.05 - SwiftCraft
Beyond the code. Complexity - 2025.05 - SwiftCraft
Dmitrii Ivanov
 
Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??
Web Designer
 
Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025
Web Designer
 

Operating system 08 time sharing and multitasking operating system

  • 1. Operating System 08 Multi-processing Time sharing and Multitasking OS Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Multiprogramming Operating System • The objective of a multiprogramming operating system is to increase the system utilization efficiency. • The batch processing system tries to reduce the CPU idle time through operator interaction. However, it cannot reduce the idle time due to IO operations. • So, when some IO is being performed by the currently executing job of a batch, the CPU sits idle without any work to do. • Thus, the multiprogramming operating system tries to eliminate such idle times by providing multiple computational tasks for the CPU to perform. • This is achieved by keeping multiple jobs in the main store. • So, when the job that is being currently executed on the CPU needs some IO, the CPU passes its requirement over to the IO processor. • Till the time the IO operation is being carried out, the CPU is free to carry out some other job.
  • 3. Time Sharing or Multitasking System • Time sharing, or multitasking, is a logical extension of multiprogramming. • Multiple jobs are executed by the CPU switching between them, but the switches occur so frequently that the users may interact with each program while it is running. • An interactive, or hands-on, computer system provides on-line communication between the user and the system. • The user gives instructions to the operating system or to a program directly, and receives an immediate response.
  • 4. Time Sharing or Multitasking System : File Management • If users are to be able to access both data and code conveniently, an on-line file system must be available. A file is a collection of related information defined by its creator. • Commonly, files represent programs (both source and object forms) and data. • The operating system implements the abstract concept of a file by managing mass-storage devices, such disks. • Files are normally organized into logical clusters, or directories, which make them easier to locate and access. • Since multiple users have access to files, it is desirable to control by whom and in what ways files may be accessed.
  • 5. Time Sharing or Multitasking System : Interactive jobs • Batch systems are appropriate for executing large jobs that need little interaction. • The user can submit jobs and return later for the results; it is not necessary for the user to wait while the job is processed. • Interactive jobs tend to be composed of many short actions, where the results of the next command may be unpredictable. • The user submits the command and then waits for the results. Accordingly, the response time should be short—on the order of seconds at most. • An interactive system is used when a short response time is required. • Time-sharing systems were developed to provide interactive use of a computer system at a reasonable cost. • A time-shared operating system uses CPU scheduling and multiprogramming to provide each user with a small portion of a time-shared computer.
  • 6. Time Sharing or Multitasking System : Process Management • Each user has at least one separate program in memory. • A program that is loaded into memory and is executing is commonly referred to as a process. • When a process executes, it typically executes for only a short time before it either finishes or needs to perform I/O. • I/O may be interactive; that is, output is to a display for the user and input is from a user keyboard. • A time-shared operating system allows the many users to share the computer simultaneously. • Since each action or command in a time-shared system tends to be short, only a little CPU time is needed for each user.
  • 7. Time Sharing or Multitasking System : Memory Management • Time-sharing operating systems are even more complex than are multi-programmed operating systems. • As in multiprogramming, several jobs must be kept simultaneously in memory, which requires some form of memory management and protection. • So that a reasonable response time can be obtained, jobs may have to be swapped in and out of main memory. • As the system switches rapidly from one user to the next, each user is given the impression that she has her own computer, whereas actually one computer is being shared among many users.
  • 8. Multi- Processing or Parallel Systems • Most systems to date are single-processor systems; that is, they have only one main CPU. However, there is a trend toward multiprocessor systems. • Such systems have more than one processor in close communication, sharing the computer bus, the clock, and sometimes memory and peripheral devices. • These systems are referred to as tightly coupled systems. • There are several reasons for building such systems such as increased throughput, lower cost, increased reliability, fault tolerance. • The Tandem system uses both hardware and software duplication to ensure continued operation despite faults
  • 9. Multiprogramming Vs Multiprocessing Vs Multitasking • The words multiprogramming, multiprocessing and multitasking are often confused. There are, of course, some distinctions between these similar, but distinct terms. The term multiprogramming refers to the situation in which a single CPU divides its time between more than one job. Time sharing is a special case of multiprogramming, where a single CPU serves a number of users at interactive terminals. In multiprocessing, multiple CPUs perform more than one job at one time. Multiprogramming and multiprocessing are not mutually exclusive. Some mainframes and supermini computers have multiple CPUs each of which can juggle several jobs. The term multitasking is described any system that runs or appears to run more than one application program one time. An effective multitasking environment must provide many services both to the user and to the application program it runs. The most important of these are resource management which divides the computers time, memory and peripheral devices among competing tasks and interprocess communication, which lets tasking coordinate their activities by exchanging information
  • 10. Assignment • Explain Time sharing Operating Systems • Briefly describe multi programming and multi- processing OS
  翻译: