• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Input Output Functions of an Operating System

Extracts from this document...

Introduction

Ricki Lambert Operating Systems Assignment 2 Input Output Subsystem Introduction An operating system is the device used to communicate with all input and output devices. For example this may be a keyboard or mouse, things of this nature. This process is controlled by a virtual layer which is known as a application input output interface. It is this device that ensures every input output device under goes a buffering and scheduling process. From here the operating system can communicate with the processor in order for the hardware device to be controlled / managed. There are four main functions that assist with this processor communications and they are as follows; 1. Input output instructions vs. memory mapped. - This is where information is sent in order for the process to be logged in to its own memory location within a register. 2. Input output hardware device - At this stage the operating system will check whether it has to read the device or write to it. 3. Polled vs. interrupt driven - Modern operating systems use interrupt driven methods in preference to its counterpart. ...read more.

Middle

be issued in to the status register * The device can see the command is ready and from here is sets the device to busy * It is now enabled to perform the writing operation It is when the above is complete that the cycle can begin again for a new set of instructions. More complex processors use the interrupt driven method and are capable of the following tasks; * At the end of each instruction it checks for further interrupts that maybe pending * It will save the programme counter * Saves the processor status * It can change the processors mode * It will jump to the well known address Interrupt Driven I/O - Data is entered form a keyboard and stored in the memory so the instruction is to write. This is then placed in to the instruction register but the actual data itself will be placed in the data register. The CPU will then receive this and send the data from the register to its desired destination. The instructions are stored in to the intermediate buffer. ...read more.

Conclusion

They are single buffering, double buffering and circular buffering. A singular buffer is used store data between the input and output device and user process. There is a double buffer which has twice the holding capacity and a circle buffer which holds many more commands. This allows less CPU waiting which ensures a better and more efficient system. This form of CPU management can then be broken down into input output issues. Caching: Caching is the form of fast memory holding copied of data (normally the data held in the data buffer). It can work with both read and write and it is key to input output performance. Scheduling: Operating systems try to invoke fairness when switching between input and output properties. This is similar to the scheduling technique. Spooling: Spooling is the form of control used by singular input/output devices. It can queue commands for example a printer, by storing them in the spooling area. Error Handling: It has input output error checking properties; it can recover from a disk read error, when the device is unavailable and such possibilities. The system often records errors in a log on the operating system. Device Reservation: It can use system calls for specific duties when needing exclusive access to a device. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    wizard is even available to help the user if they get into a complicated situation which they do not understand. cost spreadsheet has no added cost for the supermarket as it appears on all computers which are bought with Microsoft.

  2. I will explain what the specifications are for an input and output device. I ...

    Data (subject of the calculations), are momentarily, are transferred to the arithmetic/logic unit (ALU). The operations are performed and the answers to the calculations return to the main storage. The ALU is also used to make 'Logical' comparisons, which will mostly determine the route to be taken throughout the program.

  1. Processor Scheduling

    The average time is reduced and efficiency increased. An example of this can be seen below; P1 = 24ms P2 = 3ms P3 = 3ms 0 24 27 30 Here we can see that the process number one is dispatched from the ready queue and enters the processor straight away.

  2. Free essay

    Hardware and Functions of a Micro Processor

    * AND - The AND gate is somewhat different to the NOT gate in that this time it takes two inputs rather than just one. For the AND gate to output a high voltage it must receive two inputs of both one.

  1. Comparing Operating Systems

    MAC : This was developed by the makers of Apple Macintosh computers or Apple for short. It has upto now managed to hold a great deal of market share in the USA where it originated and incidentally, Microsoft is also based there.

  2. Smart Card System

    Some people refer to E(K1,D(K2,E(K1,x))) as triple-DES. This method is intended for use in encrypting DES keys and IVs for ``Automated Key Distribution''. Its formal name is ``Encryption and Decryption of a Single Key by a KeyPair''. Others use the term ``triple-DES'' for E(K1,D(K2,E(K3,x)))

  1. Flexible Architectures in Communication Security Application

    Setup Cost as a Function of Session Length. Lisa Wu Page 22 4/22/01 Figure 6 shows the relative cost of cipher setup compared to the encryption kernels. (The decryption kernels were omitted as their cost is identical to encryption). Costs are measured in run time for varied session lengths.

  2. Creating a computer system for Wooten Basset Rugby Club

    To do this I will again use the sum function in SQL. MembershipNumber, Name, Address1, Address2, City and Postcode will be the other attributes stored in this query. SELECT [tblPlayers-Fixtures].MembershipNumber, tblPlayer.Name, tblPlayer.Address1, tblPlayer.Address2, tblPlayer.City, tblPlayer.Postcode, Sum([tblPlayers-Fixtures].FeeOwed) AS SumOfFeeOwed FROM tblPlayer INNER JOIN [tblPlayers-Fixtures] ON tblPlayer.MembershipNumber = [tblPlayers-Fixtures].MembershipNumber GROUP BY [tblPlayers-Fixtures].MembershipNumber, tblPlayer.Name, tblPlayer.Address1, tblPlayer.Address2, tblPlayer.City, tblPlayer.Postcode; 4.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work