OS Unit 8 CASE STUDY
OS Unit 8 CASE STUDY
o The Apple Macintosh computer was arguably the first computer with a GUI
designed for home users. It was certainly the most successful for a while,
starting at its launch in 1984. It used a mouse for screen pointing and
selecting and came with many utility programs that took advantage of the
new user interface. Hard-disk drives were relatively expensive in 1984, so it
came only with a 400-KB-capacity floppy drive by default.
o The original Mac OS ran only on Apple computers and slowly was eclipsed by
Microsoft Windows (starting with Version 1.0 in 1985), which was licensed to
run on many different computers from a multitude of companies. As
microprocessor CPUs evolved to 32-bit chips with advanced features, such as
protected memory and context switching, these operating systems added
features that had previously been found only on mainframes and
minicomputers. Over time, personal computers became as powerful as those
systems and more useful for many purposes. Minicomputers died out,
replaced by general- and special-purpose “servers.” Although personal
computers continue to increase in capacity and performance, servers tend to
stay ahead of them in amount of memory, disk space, and number and speed
of available CPUs. Today, servers typically run in data centers or machine
rooms, while personal computers sit on or next to desks and talk to each
other and servers across a network.
• Microsoft’s design goals for Windows included security, reliability, compatibility, high
performance, extensibility, portability, and international support. Some additional
goals, such as energy efficiency and dynamic device support, have recently been
added to this list.
• Windows was designed to provide high performance on desktop systems (which are
largely constrained by I/O performance), server systems (where the CPU is often the
bottleneck), and large multithreaded and multiprocessor environments (where
locking performance and cache-line management are keys to scalability). To satisfy
performance requirements, NT used a variety of techniques, such as a synchronous
I/O, optimized protocols for networks, kernel based graphics rendering, and
sophisticated caching of file-system data. The memory-management and
synchronization algorithms were designed with an awareness of the performance
considerations related to cache lines and multiprocessors.
• These types of security features focus on user and data security, but they are
vulnerable to highly privileged programs that parse arbitrary content and that can be
tricked due to programming errors into executing malicious code. Therefore,
Windows also includes security measures often referred to as “exploit mitigations.”
These measures include wide-scope mitigations such as address-space layout
randomization (ASLR), Data Execution Prevention (DEP), Control-Flow Guard (CFG),
and Arbitrary Code Guard (ACG)
• As a final compatibility measure, Windows 8.1 and later versions also include the
Hyper-V for Client feature. This allows applications to get bug-for-bug compatibility
with Windows XP, Linux, and even DOS by running these operating systems inside a
virtual machine.
3. IBM System/360 (S/360):