Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Invitation to Computer Science 5th Edition Chapter 6 An Introduction to System Software and Virtual Machines Objectives In this chapter, you will learn about: • System software • Assemblers and assembly language • Operating systems Invitation to Computer Science, 5th Edition 2 Introduction • Naked machine – Hardware bereft of any helpful user-oriented features – Data as well as instructions must be represented in binary • To make a Von Neumann computer usable: – Create an interface between the user and the hardware Invitation to Computer Science, 5th Edition 3 System Software • The virtual machine – System software: collection of computer programs that manage the resources of a computer and facilitate access to those resources – Software: sequences of instructions that solve a problem Invitation to Computer Science, 5th Edition 4 Figure 6.1 The Role of System Software Invitation to Computer Science, 5th Edition 5 Types of System Software • Operating system – Communicates with users – Determines what they want – Activates other system programs, applications packages, or user programs to carry out their request Invitation to Computer Science, 5th Edition 6 Types of System Software (continued) • User interface – Provides user with an intuitive visual overview • Language services (assemblers, compilers, and interpreters) – Allow you to write programs in a high level • Memory managers – Allocate memory space for programs and data • Information managers – Handle the organization, storage, and retrieval of information on mass storage devices Invitation to Computer Science, 5th Edition 7 Figure 6.2 Types of System Software Invitation to Computer Science, 5th Edition 8 Types of System Software (continued) • I/O systems – Allow you to easily and efficiently use the input and output devices that exist on a computer system • Scheduler – Keeps a list of programs ready to run on the processor and selects the one that will execute next • Utilities – Library routines that provide useful services either to a user or to other system routines Invitation to Computer Science, 5th Edition 9 Assemblers and Assembly Language • Problems with machine language – Uses binary – Is difficult to change – Is difficult to create data Invitation to Computer Science, 5th Edition 10 Assembly Language • Assembly language – Low-level programming language – Each symbolic assembly language instruction is translated into exactly one binary machine language instruction • High-level programming languages – User oriented – Not machine specific – Use both natural language and mathematical notation in their design Invitation to Computer Science, 5th Edition 11 Figure 6.3 The Continuum of Programming Languages Invitation to Computer Science, 5th Edition 12 Assembly Language (continued) • Source program – Program written in assembly language • Object program – Source program must be translated into a corresponding machine language program • Assembler – System software that carries out translation • Advantage of assembly language – Allows use of symbolic addresses Invitation to Computer Science, 5th Edition 13 Figure 6.4 The Translation/ Loading/Execution Process Invitation to Computer Science, 5th Edition 14 Figure 6.5 Typical Assembly Language Instruction Set Invitation to Computer Science, 5th Edition 15 Assembly Language (continued) • Advantages of symbolic labels – Program clarity – Maintainability • Pseudo-op – Invokes the service of the assembler – Provides program construction Invitation to Computer Science, 5th Edition 16 Figure 6.6 Structure of a Typical Assembly Language Program Invitation to Computer Science, 5th Edition 17 Examples of Assembly Language Code • Conditional operation – Tests and compares values • Algorithmic problem-solving cycle – One of the central themes of computer science Invitation to Computer Science, 5th Edition 18 Figure 6.7 Algorithm to Compute the Sum of Numbers Invitation to Computer Science, 5th Edition 19 Figure 6.8 Assembly Language Program to Compute the Sum of Nonnegative Numbers Invitation to Computer Science, 5th Edition 20 Translation and Loading • Assembler – Translates a symbolic assembly language program into machine language – Tasks performed • Convert symbolic op codes to binary • Convert symbolic addresses to binary • Perform the assembler services requested by the pseudo-ops • Put the translated instructions into a file for future use Invitation to Computer Science, 5th Edition 21 Translation and Loading (continued) • Op code table – Alphabetized list of all legal assembly language op codes and their binary equivalents • In assembly language: – A symbol is defined when it appears in the label field of an instruction or data pseudo-op • Pass – Process of examining and processing every assembly language instruction in the program, one instruction at a time Invitation to Computer Science, 5th Edition 22 Figure 6.9 Structure of the Op Code Table Invitation to Computer Science, 5th Edition 23 Figure 6.10 Generation of the Symbol Table Invitation to Computer Science, 5th Edition 24 Translation and Loading (continued) • First pass over source code – Assembler looks at every instruction • Binding – Process of associating a symbolic name with a physical memory address • Primary purposes of the first pass of an assembler – To bind all symbolic names to address values – To enter those bindings into the symbol table Invitation to Computer Science, 5th Edition 25 Translation and Loading (continued) • Location counter – Variable used to determine the address of a given instruction • Second pass – Assembler translates source program into machine language • After completion of pass 1 and pass 2 – Object file contains the translated machine language object program Invitation to Computer Science, 5th Edition 26 Figure 6.11 Outline of Pass 1 of the Assembler Invitation to Computer Science, 5th Edition 27 Figure 6.12 Outline of Pass 2 of the Assembler Invitation to Computer Science, 5th Edition 28 Figure 6.13 Example of an Object Program Invitation to Computer Science, 5th Edition 29 Operating Systems • Operating system – Waits for requests and activates other system programs to service these requests • System commands – Used to translate, load, and run programs Invitation to Computer Science, 5th Edition 30 Functions of an Operating System • The user interface – Operating system commands usually request access to hardware resources, software services, or information – To communicate with a user, a GUI supports visual aids and point-and-click operations Invitation to Computer Science, 5th Edition 31 Figure 6.14 Some Typical Operating System Commands Invitation to Computer Science, 5th Edition 32 Figure 6.15 User Interface Responsibility of the Operating System Invitation to Computer Science, 5th Edition 33 Figure 6.16 Example of a Graphical User Interface Invitation to Computer Science, 5th Edition 34 System Security and Protection • Operating system – Controls access to the computer and its resources – Safeguards password file – Sometimes uses encryption to provide security • Access control – Use of a legal user name and password Invitation to Computer Science, 5th Edition 35 Figure 6.17 Authorization List for the File GRADES Invitation to Computer Science, 5th Edition 36 Efficient Allocation of Resources • I/O controller – Frees the processor to do useful work while the I/O operation is being completed • To ensure that a processor does not sit idle if there is useful work to do: – Operating system keeps a queue of programs that are ready to run Invitation to Computer Science, 5th Edition 37 The Safe Use of Resources • Operating system – Prevents programs or users from attempting operations that cause the computer system to enter a “frozen” state • Deadlock – Each program is waiting for a resource to become available that will never become free Invitation to Computer Science, 5th Edition 38 The Safe Use of Resources (continued) • Deadlock prevention – Operating system uses resource allocation algorithms that prevent deadlock from occurring in the first place • Deadlock recovery algorithms – Detect and recover from deadlocks Invitation to Computer Science, 5th Edition 39 Summary of OS Responsibilities • Major responsibilities of operating systems – User interface management (a receptionist) – Control of access to system and files (a security guard) – Program scheduling and activation (a dispatcher) – Efficient resource allocation (an efficiency expert) – Deadlock detection and error detection (a traffic officer) Invitation to Computer Science, 5th Edition 40 Historical Overview of Operating Systems Development • First-generation system software – Roughly 1945–1955 – No operating systems and very little software support • Second-generation system software – Called batch operating systems (1955–1965) • Command language – Commands specifying to the operating system what operations to perform on programs Invitation to Computer Science, 5th Edition 41 Figure 6.18 Operation of a Batch Computer System Invitation to Computer Science, 5th Edition 42 Figure 6.19 Structure of a Typical Batch Job Invitation to Computer Science, 5th Edition 43 Historical Overview of Operating Systems Development (continued) • Third-generation operating systems – Multiprogrammed operating systems (1965–1985) – Many user programs are simultaneously loaded into memory – User operation codes: could be included in any user program – Privileged operation codes: use restricted to the operating system or other system software Invitation to Computer Science, 5th Edition 44 Historical Overview of Operating Systems Development (continued) • Time-sharing system – Many programs can be stored in memory – Allows programmer to enter system commands, programs, and data online • Distributed environment – Much of the computing was done remotely in the office, laboratory, classroom, and factory • Network operating system – Fourth-generation operating system (1985–present) Invitation to Computer Science, 5th Edition 45 Figure 6.20 Configuration of a Time-Shared Computing System Invitation to Computer Science, 5th Edition 46 Figure 6.21 A Local Area Network Invitation to Computer Science, 5th Edition 47 Historical Overview of Operating Systems Development (continued) • Real-time operating system – Manages resources of embedded computers that are controlling ongoing physical processes – Guarantees that it can service important requests within a fixed amount of time Invitation to Computer Science, 5th Edition 48 The Future • Multimedia user interfaces – Will interact with users and solicit requests in a variety of ways • Parallel processing operating system – Can efficiently manage computer systems containing tens, hundreds, or even thousands of processors • Distributed computing environment – Users do not need to know the location of a given resource within the network Invitation to Computer Science, 5th Edition 49 Figure 6.23 Structure of a Distributed System Invitation to Computer Science, 5th Edition 50 Figure 6.24 Some of the Major Advances in Operating Systems Development Invitation to Computer Science, 5th Edition 51 Summary • System software – Acts as an intermediary between the users and the hardware • Assembly language – Creates a more productive, user-oriented environment than machine language • An assembler – Translates an assembly language program into a machine language program Invitation to Computer Science, 5th Edition 52