0% found this document useful (0 votes)
35 views3 pages

OS Unit 8 CASE STUDY

Uploaded by

venomzeus79
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views3 pages

OS Unit 8 CASE STUDY

Uploaded by

venomzeus79
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Macintosh Operating System (macOS):

o The Apple Macintosh computer was arguably the first computer with a GUI
designed for home users. It was certainly the most successful for a while,
starting at its launch in 1984. It used a mouse for screen pointing and
selecting and came with many utility programs that took advantage of the
new user interface. Hard-disk drives were relatively expensive in 1984, so it
came only with a 400-KB-capacity floppy drive by default.

o The original Mac OS ran only on Apple computers and slowly was eclipsed by
Microsoft Windows (starting with Version 1.0 in 1985), which was licensed to
run on many different computers from a multitude of companies. As
microprocessor CPUs evolved to 32-bit chips with advanced features, such as
protected memory and context switching, these operating systems added
features that had previously been found only on mainframes and
minicomputers. Over time, personal computers became as powerful as those
systems and more useful for many purposes. Minicomputers died out,
replaced by general- and special-purpose “servers.” Although personal
computers continue to increase in capacity and performance, servers tend to
stay ahead of them in amount of memory, disk space, and number and speed
of available CPUs. Today, servers typically run in data centers or machine
rooms, while personal computers sit on or next to desks and talk to each
other and servers across a network.

o Gatekeeper: Gatekeeper ensures that only trusted software from the


App Store or identified developers can run on your Mac. It prevents
unauthorized apps from executing.
o XProtect: XProtect scans files for known malware and prevents them
from running.
o File vault: File vault encrypts your entire startup disk, protecting your
data even if your Mac is stolen.
o Firewall: macOS includes a built-in firewall to block unauthorized
network traffic.
o Privacy Controls: Users can control app access to sensitive data such
as location, contacts, and camera.
o Sandboxing: Apps run in isolated sandboxes, limiting their access to
system resources.
o Secure Boot: Ensures that only trusted software loads during startup.
o System Integrity Protection (SIP): Protects critical system files and
directories from modification by unauthorized processes.
2. Windows 10:

• Microsoft’s design goals for Windows included security, reliability, compatibility, high
performance, extensibility, portability, and international support. Some additional
goals, such as energy efficiency and dynamic device support, have recently been
added to this list.

• Windows was designed to provide high performance on desktop systems (which are
largely constrained by I/O performance), server systems (where the CPU is often the
bottleneck), and large multithreaded and multiprocessor environments (where
locking performance and cache-line management are keys to scalability). To satisfy
performance requirements, NT used a variety of techniques, such as a synchronous
I/O, optimized protocols for networks, kernel based graphics rendering, and
sophisticated caching of file-system data. The memory-management and
synchronization algorithms were designed with an awareness of the performance
considerations related to cache lines and multiprocessors.

• Windows uses encryption as part of common protocols such as those used to


communicate securely with websites. Encryption is also used to protect user files
stored on secondary storage. Windows 7 and later versions allow users to 21.2
Design Principles 827 easily encrypt entire volumes, as well as removable storage
devices such as USB flash drives, with a feature called BitLocker. If a computer with
an encrypted volume is stolen, the thieves will need very sophisticated technology
(such as an electron microscope) to gain access to any of the computer’s files, and it
will be impossible for them to do so if the user has also configured an external USB-
based token (unless the USB token was also stolen).

• These types of security features focus on user and data security, but they are
vulnerable to highly privileged programs that parse arbitrary content and that can be
tricked due to programming errors into executing malicious code. Therefore,
Windows also includes security measures often referred to as “exploit mitigations.”
These measures include wide-scope mitigations such as address-space layout
randomization (ASLR), Data Execution Prevention (DEP), Control-Flow Guard (CFG),
and Arbitrary Code Guard (ACG)

• As a final compatibility measure, Windows 8.1 and later versions also include the
Hyper-V for Client feature. This allows applications to get bug-for-bug compatibility
with Windows XP, Linux, and even DOS by running these operating systems inside a
virtual machine.
3. IBM System/360 (S/360):

o The longest line of operating-system development is undoubtedly that of IBM


computers. The early IBM computers, such as the IBM 7090 and the IBM
7094, are prime examples of the development of common I/O subroutines,
followed by development of a resident monitor, privileged instructions,
memory protection, and simple batch processing. These systems were
developed separately, often at independent sites. As a result, IBM was faced
with many different computers, with different languages and different system
software.

o The memory-management routines were hampered by the architecture.


Although a base-register addressing mode was used, the program could
access and modify the base register, so that absolute addresses were
generated by the CPU. This arrangement prevented dynamic relocation; the
program was bound to physical memory at load time. Two separate versions
of the operating system were produced: OS/MFT used fixed regions and
OS/MVT used variable regions.

o The system was written in assembly language by thousands of programmers,


resulting in millions of lines of code. The operating system itself required large
amounts of memory for its code and tables. Operating-system overhead often
consumed one-half of the total CPU cycles. Over the years, new versions were
released to add new features and to fix errors. However, fixing one error
often caused another in some remote part of the system, so that the number
of known errors in the system remained fairly constant.

o Access Controls: S/360 had access controls to restrict user access to


specific resources and data.
o User Authentication: Users needed valid credentials to log in and
access the system.
o Resource Isolation: S/360 allowed partitioning of resources (such as
memory and CPU) to prevent interference between different tasks.
o Data Encryption: Although not as advanced as modern encryption,
S/360 supported basic encryption for data protection.
o Physical Security: Mainframe systems were physically secured in data
centers.
o Auditing and Logging: S/360 recorded system events and user actions
for auditing purposes.
o Job Control Language (JCL) Security: JCL scripts were used to submit
batch jobs; proper authorization was required to execute them.

You might also like