• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Input Output Functions of an Operating System

Extracts from this document...

Introduction

Ricki Lambert Operating Systems Assignment 2 Input Output Subsystem Introduction An operating system is the device used to communicate with all input and output devices. For example this may be a keyboard or mouse, things of this nature. This process is controlled by a virtual layer which is known as a application input output interface. It is this device that ensures every input output device under goes a buffering and scheduling process. From here the operating system can communicate with the processor in order for the hardware device to be controlled / managed. There are four main functions that assist with this processor communications and they are as follows; 1. Input output instructions vs. memory mapped. - This is where information is sent in order for the process to be logged in to its own memory location within a register. 2. Input output hardware device - At this stage the operating system will check whether it has to read the device or write to it. 3. Polled vs. interrupt driven - Modern operating systems use interrupt driven methods in preference to its counterpart. ...read more.

Middle

be issued in to the status register * The device can see the command is ready and from here is sets the device to busy * It is now enabled to perform the writing operation It is when the above is complete that the cycle can begin again for a new set of instructions. More complex processors use the interrupt driven method and are capable of the following tasks; * At the end of each instruction it checks for further interrupts that maybe pending * It will save the programme counter * Saves the processor status * It can change the processors mode * It will jump to the well known address Interrupt Driven I/O - Data is entered form a keyboard and stored in the memory so the instruction is to write. This is then placed in to the instruction register but the actual data itself will be placed in the data register. The CPU will then receive this and send the data from the register to its desired destination. The instructions are stored in to the intermediate buffer. ...read more.

Conclusion

They are single buffering, double buffering and circular buffering. A singular buffer is used store data between the input and output device and user process. There is a double buffer which has twice the holding capacity and a circle buffer which holds many more commands. This allows less CPU waiting which ensures a better and more efficient system. This form of CPU management can then be broken down into input output issues. Caching: Caching is the form of fast memory holding copied of data (normally the data held in the data buffer). It can work with both read and write and it is key to input output performance. Scheduling: Operating systems try to invoke fairness when switching between input and output properties. This is similar to the scheduling technique. Spooling: Spooling is the form of control used by singular input/output devices. It can queue commands for example a printer, by storing them in the spooling area. Error Handling: It has input output error checking properties; it can recover from a disk read error, when the device is unavailable and such possibilities. The system often records errors in a log on the operating system. Device Reservation: It can use system calls for specific duties when needing exclusive access to a device. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    Link: http://www.oddtodd.com/mw/clip_image003.gif One such approach/process used in Software Development is "The Waterfall Model". Waterfall approach was first Process Model to be introduced and followed widely in Software Engineering to ensure success of the project. In "The Waterfall" approach, the whole process of software development is divided into separate process phases.

  2. Free essay

    Hardware and Functions of a Micro Processor

    If this condition is not met then the output will be a low voltage. This can be represented in a truth table which can be seen below; Input A Input B Output 0 0 0 0 1 0 1 0 0 1 1 1 * OR - The OR gate

  1. Programming Techniques

    There are two main types of loop: * While/Repeat - used when the number of loops to be taken is unknown on entry (conditional loop) * For - used when the number of loops is known in advance (unconditional loop)

  2. The Global Positioning System

    This principle requires an accurately surveyed base station. This base station continuously records its apparent position given by GPS. It then broadcasts the difference between the true position and the apparent GPS position. This difference is transmitted to DGPS beacons, and could provide accuracy of 1-5 metres.

  1. Processor Scheduling

    The average time is reduced and efficiency increased. An example of this can be seen below; P1 = 24ms P2 = 3ms P3 = 3ms 0 24 27 30 Here we can see that the process number one is dispatched from the ready queue and enters the processor straight away.

  2. Comparing Operating Systems

    These people then found ways of overriding certain functions, disabling certain features and using the system to their own advantage and a term was coined for them to be known as "Hackers". Windows has had to deal with this breed of programmers to continue to hold the market and continuously

  1. Smart Card System

    1.5 Transmission Control Protocol (TCP) Initially, TCP was designed to recover from node or line failures where the network propagates routing table changes to all router nodes. Since the update takes some time, TCP is slow to initiate recovery. The TCP algorithms are not tuned to optimally handle packet loss due to traffic congestion.

  2. Flexible Architectures in Communication Security Application

    that do not map well to a general-purpose microprocessor. It is interesting to note that a 1 GHz processor running the 3DES kernel (a common encryption mode for secure web transports) would produce a maximum throughput of 7.32 MBytes/s, not even enough throughput to saturate a trailing edge 100 MBs Ethernet link, and barely enough to saturate a low-cost T3 communication line.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work