Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:28):
And welcome to
Technology Tap.
I'm Professor Jay Rod.
In this episode we're going totalk about Operating Systems.
Let's get to it, alright,welcome everyone.
(01:03):
For those of you who don't knowme first time listening to
Technology Tap, my name isProfessor Jay Rod, that's
J-R-O-D and I'm Professor ofCyber Security and the reason
for this podcast is to help mystudents pass there, or any
student out there pass theirCompTIA A plus, network plus and
(01:23):
security plus.
And you could not only find meon this podcast but you could
also find me on TikTok.
I'm at Professor Jay Rod,that's J-R-O-D, and there I do
question and answers, quick one,two minute question and answer
sessions.
I'll do a quick likedefinitions and stuff that's
(01:45):
general for you to learn for theCompTIA exam, but it's like one
or two minutes, three minutesthe most burst.
You don't want to get too manyminutes on TikTok.
People get bored, but I'mtrying to get a thousand likes.
If I go and get a thousandlikes I'll have the ability to
go live and you know I cananswer questions that you guys
have about CompTIA, anythingelse.
(02:07):
So make sure you look for me onTikTok at Professor Jay Rod.
Alright, so today we are doingOperating Systems, so let's take
a look.
So it's different functions ofa core function of the operating
systems, and there's several.
We might have to do this indifferent stages.
It might not be just, it justmight be a part two, depending
(02:32):
how long you know we last.
Usually for those of you whoare new usually I try to make
the podcast between 27 to halfan hour, not not too much longer
than that.
So if I go past 28 minutes, 29minutes, I'll stop and I can do
a part two of core functions ofOperating Systems, alright.
(02:53):
So let's look at the firstfunction, which is process
management.
And then process management is afundamental aspect of operating
systems.
That involves the creation,scheduling, execution and
termination of processes, andhere's an overview.
One is process creation, whichincludes program execution
(03:14):
processes.
Processes are instance,instances of executing programs.
When a program is executed, theoperating system creates a new
process to execute the program'sinstructions.
Also fork operation.
In Unix, like operating systems, the fork system call is used
to create a new process which isa copy of the parent process.
(03:35):
The child process can thenexecute a different program
using the exec system call.
Next is process state we havenew.
The process is being createdready.
The process is ready to executeand is waiting for the CPU and
then running.
The process is currently beingexecuted by the CPU, blocked or
(03:55):
waiting.
The process is waiting for anevent to occur, such as user
input or I O operations, andthen the last is terminated.
The process is finished.
Execution.
Next we move on to processscheduling.
When you scheduling analgorithm, the operating system
scheduler determines whichprocess to execute next on the
ski on the CPU.
(04:16):
Scheduling algorithms includefirst come, first serve,
shortest job, next round Robin,priority scheduling and multi
level to scheduling.
Next is context switching.
When the scheduler switchesfrom executing one process to
another, a contact switch occurswhere the state of the current
(04:38):
process is saved and the stateof the next process is restored.
Process synchronization andcommunication Synchronization
process may need to synchronizetheir execution to access shared
resources or avoid raceconditions.
Synchronization mechanisms likesemi forms and monitors ensure
(05:00):
mutual exclusive access toshared resources.
Inter process communicationprocesses may communicate and
exchange data with each otherusing IPC mechanisms or inter
process communication mechanismssuch as pipes, message queues,
shared memory and sockets.
Process termination First westart with normal termination.
(05:21):
A process terminates aftercompleting its execution on a
specifically calls the exitsystem.
Call Abnormal termination Aprocess may terminate abnormally
due to errors, exceptions orsignals.
And then we have cleanup.
When a process terminates, theoperating system releases
allocated resources, closes,open files, the allocates memory
(05:45):
to prevent resource leaks.
Next we go to process controlblock.
The CB, the PCB structure.
Each process is presented isrepresented by process control
block in the operating system.
The process control blockcontains information about the
process sees, including isprocessing ID, state program
(06:08):
counter, cpu registers, memoryallocation and scheduling
information.
Pid is processing IDs.
If you look at task managerfrom the command line, you see
the PID numbers for fordifferent numbers that you have
open.
So let's say you have no padopen and you do task manager,
you see the the PID number forno pad.
(06:31):
Process management operationsthe operating system performs
various process managementoperations, including process
creation, scheduling, contactswitching, synchronization and
termination based on theinformation stored in the PCB.
Process management is acritical component of modern day
operating systems, enablingefficient multitasking,
(06:54):
resources allocation andcoordination of current
activities in computingenvironment.
Operating systems usesophisticated and sophisticated
process management techniques tomaximize CPU utilization,
improve system responsivenessand ensure reliable execution of
software applications.
(07:15):
Next we are going to memorymanagement.
Memory management is a crucialaspect of operating systems that
involves the allocation, theallocation and organization of
memory resources in the computersystems.
Let's take a look at anoverview.
First we look at memoryhierarchical hierarchy.
First we start with registers,the smallest and fastest type of
(07:38):
memory located within the CPUused to store data and
instructions being processed.
Cache high speed memory locatedbetween the CPU and the main
memory, used to temporary storefrequently access data and
instructions.
Main memory, which is RAMvolatile memory used to store
instructions and data duringexecution.
(07:59):
You have secondary storage, nonvolatile storage, like what
hard drives and solid statedrives used for long term
storage.
We have next main memorymanagement unit.
It's responsible fortranslating logical address
generated by the CPU intophysical address in main memory.
(08:20):
Memory management unit performaddress translation, memory
protection and memorysegmentation or paging.
Next we have memory allocation,both static and dynamic.
Static allocation is whenmemory is allocated to programs
at compiled time and remainsfixed throughout the program's
(08:40):
execution.
Dynamic memory is memoryallocated and deallocated during
a program execution as needed.
Next we have memory protection.
Operating systems enforcememory protection mechanism to
prevent unauthorized access tomemory regions.
Read only read, write andexecute.
(09:01):
Permissions are assigned tomemory pages to control access
by processes.
Memory protection helps preventbuffer overflows, stack
smashing and other securityvulnerabilities.
Next we have virtual memory.
Virtual memory allows programsto use more memory than
physically available by usingcombination of RAM and secondary
(09:24):
storage, as memory pages areswapped between RAM and disk
storage to accommodate theprogram's memory requirements.
Virtual memory enableseffective memory utilization,
multitasking and memory sharingamong processes, and that's very
.
If you've never done that, it'spretty cool to see that in
(09:49):
action.
And you can always increaseyour virtual memory on your
computer.
That's very easy to do.
Next is memory paging.
Paging is a memory managementscheme that divides physical
memory into fixed size blockscalled pages.
Virtual memory address aremapped to physical memory
(10:09):
address using page tablesoperated by and maintained by
the operating system.
Memory reduce memoryfragmentation and enables
efficient memory allocation andmanagement.
Then we have memoryfragmentation.
Fragmentation occurs whenmemory is allocated and
(10:30):
deallocated in a way that leavesunused memory blocks scattered
throughout the address space.
Fragmentation can lead toinefficient memory usage and
reduced system performance.
Precinct, like compaction andmemory pooling, are used to
reduce fragmentation and improvememory utilization.
Memory swapping Memory swappinginvolves moving inactive or
(10:54):
less frequent use memory pagesfrom RAM to disk storage to free
up physical memory for activeprocess.
Swapping is performed by theoperating system's memory
manager, based on predefinedswapping algorithms and memory
usage patterns.
Memory management is criticalfor optimizing system
performance, ensuring reliableprogramming execution and
(11:17):
maintaining system stability.
In modern operating systems,operating systems use a
combination of memory managementtechniques to efficiently
allocate, protect and utilizesystem memory resources across
diverse computing environmentsand workloads.
File system management is thenext one.
File system management is acrucial component of operating
(11:39):
systems that facilitates theorganization, storage, retrieval
and manipulation of files anddirectories.
Here's an overview.
First we start with file systemconcepts.
Files are logical units of datastored on storage devices.
They contain user data,programs, configurations and
other information.
(12:00):
Next we have directories.
Directories or folders Arecontainers used to organize and
group related files and otherdirectories within a
hierarchical structure.
Paths are unique identifiersthat specify the location of
files and directories within thefile system hierarchy, like see
(12:22):
users downloads.
Right, that's a path.
File attributes.
A file system store beta dataassociated with files, including
file name, size, creation, date, modification, date, permission
and ownership.
File system types.
It's next disk based file system.
(12:42):
Disk based file systems likeNTFS for Windows, ex4 for Linux
and HFS Plus for Mac OS areoptimized for storing and
accessing files on the hard diskdrives and solid state drives,
you have your network filesystems.
Network file systems enablefile sharing and access over the
(13:04):
network.
Files include NFS for Unix likesystems, and SMB, which is
small message block, and CIFSfor Windows system, and you need
that small message block.
You need for more than justfiles.
You could use it for printingalso Distributed file systems.
Distributed file systems likehow do distributed file systems
(13:28):
and Google file systemsdistribute and manage file
storage across multiple serversand distributed computing
environment.
Next we have file operations,file creation and deletion.
Operating systems provide APIand system calls for creating,
deleting and managing files.
Examples includes open, close,create unlinked system calls.
(13:53):
And that's where, like Unix, ifsome of you are not familiar
with those File writing andreading file system support
reading, write operations forreading data from files and
writing data to files usingsystems calls like read and
write, and then files seeking.
File seeking operations allowusers to navigate within the
files and move the file pointedto specific position using
(14:16):
functions like seek, find,search, right File system
organization.
File allocation table, or FAT,is a simple file system
structure used in older Windowssystems for organizing files and
directories.
They use FAT and FAT32 on USBsMaster file table, mft.
(14:39):
Ntfs uses master file table tostore metadata and file systems.
Metadata structures Inno's Unix, like file system use.
X4 uses index nodes or in nodesto represent files and
directories and store metadataassociated with them.
And then you have file systemfeatures journaling file systems
(15:03):
like X4 and NTFS use journalingto record file systems
transactions, ensuring dataconsistency and reliability in
the event of a system crash orpower failures.
File compression some filesystems support file compression
techniques to reduce storagespace usage and improve file
(15:24):
transfer efficiency.
Encryption file systemencryption features like
BitLocker for Windows andFileVolve for Mac OS.
Encrypt file content to protectsensitive data from
unauthorized access.
And then access control listallows administrator to define
granular access permission forfiles and directories,
(15:46):
specifically which users orgroups have rewrite or execute
permissions.
File system maintenance youhave file system check it's a
utility that scans and repairfile system errors,
inconsistencies and corruptionto maintain data integrity and
prevent data loss.
Defragmentation it's a utilitythat optimized this performance
(16:09):
by rearranging fragmented filesand consolidating free space on
storage drives.
Stand by sleep to conserveenergy and extend battery power
in mobile devices and laptop.
Power management policiesoperating system implement power
management policies to controldevice power states dynamically
(16:30):
based on a system, workload,user activity and power source
conditions.
Device monitoring andmaintenance device monitoring
operating systems monitor devicestatus, perform metrics and
error conditions to detecthardware failures, driver issues
and resource conflicts.
Device configurations anddiagnostics systems.
(16:51):
Utilities and administratortools allow users to configure
device settings, diagnosehardware problems and perform
maintenance task.
Device security access controloperating systems enforce access
control policies to restrictaccess to sensitive devices and
device resources based on userprivileges and permission.
(17:13):
Device isolation,virtualization technologies and
containerization techniquesprovide mechanisms to isolate
and sandbox device access forsecurity and reliability
purposes.
Device hot plugging and removalhot plugging allow users to
(17:36):
connect and disconnect devicesfrom the system while it's
running without requiring systemreboot and hot swapping.
So system support hot swappingdevice where device can be
replaced or upgraded withoutinterrupting system operations.
Device management plays acrucial role in ensuring
efficient and reliableoperations of hardware devices
(17:57):
within the operating system.
By abstracting hardwarecomplexities, providing standard
standardize interfaces andimplementing robust management
and control mechanism, operatingsystems enables seamless
integration and interactionbetween software application and
the diverse range of hardwareperipherals and components.
(18:21):
First we have security andaccess control, which are
critical aspects of operatingsystems, ensuring that resources
are protected and onlyauthorized users or processes
can access.
Here's an overview of securityand access control mechanisms in
operating systems.
First one is userauthentication.
You have your login credentials.
(18:42):
Operating systems requiresusers to authenticate themselves
using login credentials such asusername, password, pins or
biometric data, fingerprint,facial recognition of the like,
multi-factor authentication,which is the big thing now, as
an extra layer of security, byrequiring users to provide
(19:03):
multiple forms of identification, such as password and one time
code sent to their mobile device.
So people talk aboutmulti-factor authentication at
my students.
How long do you thinkmulti-factor authentication has
been around?
And some people say like, oh,two years.
(19:23):
Or some people say five years,some people say 10 years.
It's actually been around forlonger than that.
It's actually been around forlike 40 years, I think.
Because if you look at onething, that's multi-factor,
that's been around for years,and I'm going to tell you you're
going to be like oh yeah,you're right.
Taking money out of the ATMmachine, that's multi-factor.
(19:45):
You need a card, which issomething that you have, and you
need the pin, which issomething that you know.
That's multi-factor.
Right, that's not themulti-factor, like you know now,
where they send a code to yourphone one time code but that is
multi-factor.
Taking money out of the ATM isa multi-factor that you're doing
so.
(20:05):
It's been around for a longtime.
All right Access control models.
You have your discretionaryaccess control, or DAC.
Allows users to control accessto their own resources by
setting permissions on files anddirectories.
Permissions include read, writeand execute privileges for the
owner group and others.
You have mandatory accesscontrol, or MAC.
(20:28):
Enforces access controlpolicies based on a system-wide
rules set by administrators.
Users cannot override MAC rules, which are typically based on
security labels orclassifications like secret, top
secret, that sort.
Then you have role ACLs accesscontrol lists.
(20:50):
Acls are a list of permissionsattached to files and
directories, specifically whichusers or groups have specific
access rights read, write,execute.
Extended ACLs allow findergranular control by specifying
access permissions for differentuser class, owner groups and
others and applying additionalrules based on user attributes
(21:14):
or roles.
Then you have rule-based accesscontrol, which assigns
permissions to users based ontheir roles within their
organizations.
Users are assigned roles andpermissions are associated with
those roles.
This simplifies administrationand ensures consistent access
control across the organization.
(21:34):
If they have somebody who'sspecial, then that messes up
everything.
And if you know, you knowSecurity policies and
enforcement Security policies.
Operating systems enforcesecurity policies to govern user
behavior, resource access andsystem configuration.
Policies define rules forpassword complexity, account
(21:58):
lockout, file passwords, filepermissions and network access.
Security Audit Security AuditMechanism track users activity,
system events and accessattempts to detect security
breaches, policy violations andsuspicious behavior.
Encryption and data protectionyou have file encryption.
(22:20):
Operating systems offerencryption features to protect
sensitive data stored on disk.
Encryption algorithms like AESadvanced encryption standards
encrypt files and directories toprevent unauthorized access.
Disencryption fulldisencryption solutions like
BitLocker for Windows and Favolfor macOS encrypt an entire disk
(22:43):
volume to safeguard data atrest.
Firewall and network securityFirewall operating system may
include a built-in firewallsoftware to monitor and filter
network traffic, blockingunauthorized access attempt and
malicious connections.
Network security Operatingsystems support network security
(23:04):
protocols like IPsec and SSLTLSto encrypt network
communications to ensure dataconfidentiality and integrity.
Software updates and patchmanagement Software updates
operating system vendors releasesecurity patches and software
(23:25):
updates to addressvulnerabilities, bugs and
security flaws.
Regular updates help mitigatesecurity risk and protect
against known threats.
Then you have patch management.
Patch management tools automatethe process of deploying
software updates and patchesacross distributed systems,
ensuring that systems remain upto date and secure.
(23:49):
By implementing robust securityand access control mechanism,
operating systems help safeguardsensitive data, prevent
unauthorized access and mitigatesecurity risk in computing
environments.
These mechanisms ensure thatauthorized users and processes
(24:09):
can access resources, protectingconfidentiality, integrity and
availability of informationassets.
(24:30):
I'm trying to get into thegranular of the operating system
so that people think aboutoperating systems and they just
take up windows and what it canand cannot do.
They need to look at thegranular of what windows, mac,
linux, unix, what they all do,and this is what we're trying to
do here at TechnologyTap.
So just a few housekeeping tips.
(24:56):
I'm still doing TechnologyTapPremium for those of you who
want to join.
It's an extra service, $5 amonth.
Not looking to get rich off youguys, but you know there are
expenses to doing a podcast.
I want to be able to dogiveaways.
I want to.
I gave away.
Actually he did a nice thing.
I have a winner who won thenetwork plus.
(25:20):
He won it over the summernetwork plus certification
voucher.
He actually wants me to give itaway.
I don't know how I'm going todo that yet, but he told me that
I can give it away to anybodywho wants because he recently
got his security plus.
He's not really interested innetwork plus, but shout out to
(25:44):
him my winner who won over thesummer.
And if anybody's interested youknow what, let's do this.
If anybody's interested ingetting a free network plus
voucher, write me an email atProfessor J Rod as JROD, and
(26:07):
tell me why I should pick you.
Why should pick you for this?
You know network voucher, thatthat time is in the Thomas
Otomas one and he wants to giveit out.
So if you think that's you,email me, professor J rod, at
gmailcom and tell me why youshould win.
(26:28):
Right, you should put on thesubject why should I win, you
know?
Or network certification.
Yeah, put network certificationon the on the subject line.
That way I make sure that it'snot spamming and throw it out
and then give me a compellingreason why you think you should
get it.
Now, if you've never studied forthe, for the network plus exam,
don't send me an email, right,because you know if you haven't
(26:50):
studied for it.
But if you study for it and youready to take network plus and
the barrier is this the.
You know the.
You know you don't have themoney for the certification,
email me, right, you know.
I find that that's one of the,the biggest thing that I see.
(27:11):
That's a very big barrier for alot of my students.
He said they take the course orthey study and they tell me
that they ready, but they can'tafford to buy a voucher Because
these vouchers are.
They're not cheap, they'reexpensive.
So part of the reason why I dothis podcast is in the tick tock
now is I'm hoping that somebodylike CompTIA notices me and
(27:35):
then not that they, not that Iwant to get sponsored for money,
but I would like to getsponsored to give away, you know
, comptia vouchers, because Ithink that that is the number
one obstacle for people Gettingtheir certification.
Believe me, guys, I teach compTIA a plus all the time, like
(27:58):
all the time right, and and Iknow that that's the you know
I'll get, let's say, 20 studentsto take the comp TIA and out of
the 20, there may be 12 who Ithink Already to take the exam
and out of those 12, maybe oneor two of them will actually
take it because you know theywant.
(28:19):
They want to make sure thatthey're ready and they don't
want to spend their money totake the exam and then fail
Right.
They want to make sure thatthey 100% ready and Even if I
tell them, look, I think you'reready, they still won't take it
because they don't want to fail,because they don't want to
spend the money.
It's a lot, it's a lot for them.
You know, a plus is two exams,like two hundred and sixty four
(28:42):
dollars, that's five, it's overfive hundred bucks.
So, you know, if I could get,you know, if somebody from comp
TIA ever listens to this Rightand and they want to sponsor me
and and you know, say, hey,we'll give you, you know, a
voucher every, I don't know,once a month or once every other
(29:03):
month, I'll be glad to give itaway.
I'm not, I'm not here to make,you know, to be a millionaire,
but you know, I'm here to helppeople who want to get the
certifications, because, take itfor me.
I know the computers changeyour life.
I mean, I know that IT, likeany job, right, you got to be
(29:23):
passionate about it, but I knowit changed my life, it could
change your life.
You know, moving over toacademia of IT definitely
changed my, my life.
You know, you got willing.
I'm only a few, a few weeksaway from From being a doctor
Rodriguez instead of professorRodriguez, but that's the story
(29:45):
for another day.
Guys, I'll let you know if andwhen that ever.
You know if and when thathappens.
So, but you know I this is why Ido this right.
I want, I want people out theretoo to get certified and and
become very successful.
And you know, it doesn't matterthat you end up making more
money than me.
That's my big joke that I tellmy students, you know, and I
(30:07):
won't be mad if you make moremoney than me.
Now you buy me a steak, youknow when you, when you.
You know, I have a student whoworks at a and at a famous beer
distributor or beer maker, andhe still has me a case of beer
because he says they Like they.
(30:29):
There's cases like when youleave the office, there's like
cases right there.
You can just Pick it up and andtake it with you.
So he still owes me a case.
I won't say which one, but heknows.
He knows what I'm talking about.
I saw him recently, so he knows.
But this is why I do it, guys.
I do it, you know, for you.
So you know.
That's why, when you see like,oh wait, he hasn't come out with
(30:50):
an episode For a while.
It's not that I'm slacking,yeah, I'm doing other things,
doing my dissertation now.
So that took up a lot of mytime but you know I'm as long as
I'm around.
I'm gonna still try to do thispodcast and I hope and pray that
somebody recognizes me andrecognize what I'm trying to do
here and, you know, believes inthis, what we're doing, and
(31:11):
agrees to sponsor me.
But Anyway, next time we'll dopart two on operating systems.
I'm looking at my notes.
It's a lot, so might either dopart two or maybe you're in a
part three on operating systems.
But until next time We'll seeyou.
This has been a production ofLittle Chachal.
(31:56):
Productions are by Sarah, musicby Job Kim.
If you like to reach me, youcan reach me at
professorjrodjrod at gmailcom.
I'm also on instagram atprofessor jrod and I'm also now
on tiktok At professor Jrod JROD.