SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Windows Architecture
 Windows 2000 architecture is the latest architecture
of Windows operating system
 Layered design consist of two main components user
mode and kernel mode.
 This structure is a modular structure, composed of
several simple modules. These modules are:
 Hardware Abstraction layer
 Kernel
 Executive Services
 Environment Subsystem
Modes of Windows operating system
• Protected mode/Kernel mode — HAL,
kernel, executive. kernel mode has
unrestricted access to the system memory
and external devices
• User mode — collection of subsystems.
User mode has limited in term of system
resources they have access
Hardware Abstraction Layer
 It is a layer of software or programming that hides
(Abstraction) the hardware differences from the
operating system.
 This allows Windows 2000 to be portable from one
hardware platform to another.
 The HAL consists of a series of function that hides or
abstract differences between hardware platforms.
Kernel
 Windows Kernel is known as hybrid kernel.
 The Kernel works very closely with the HAL
 It schedules the activities to be performed by the CPU.
 kernel synchronizes activity among processors to optimize
performance.
 kernel mode stops user mode services and applications
from accessing critical areas of the operating system that
should not have access to.
 Kernel mode drivers exist in three levels.
1) Highest level drivers
2) Intermediate level drivers
3) Low level drivers
 The Microkernel is a collection of programs that can
provide tasks such as address space management,
thread management and inter-process
communication (IPC).
 The Microkernel along with the Windows kernel to
make the operating system work efficiently.
Four main responsibilities of kernel
 thread scheduling
 interrupt handling
 low-level processor synchronization
 recovery after a power failure
Executive Services
 The Executive Services, which includes the kernel
and the HAL, provides a set of common services that
the user can use. This section interacts with
Input/output devices, object management,
process management and the system security.
Each group of services is managed by one of the
components of the executive services, which are as
follows:
 Object Manger
 Power Manger
 Process Manager
 I/O Manager
 Virtual memory management
 Local Procedure Call Facility
 Cache Manager
 Security Reference Monitor
 Plug and Play Monitor
 Device Drive Manager
Object Manager
 The Object Manager provides rules for retention,
naming and security of objects. Objects can be, for
example, files and folders saved in the file system. It
also removes the duplicate object resources.
Creation and insertion of objects can be done in this
section.
Objects are manipulated by a standard set of methods,
namely create, open, close, delete, query name and
security
Power Manger
 The Power Manger deals with power events like
power-off, stand-by, and hibernate. Windows 2000
supports all of the latest standards in Power
Management including the Advanced Power
Management (AMP) and Advanced Configuration
and Power Interface (ACPI).
 Consequently, network devices can be powered off
when not in use and dynamically reactivated when
network access is required.
 Check network security.
Process Manager
 The Process Manager manages the creation and
deletion of processes. It provides a standard set of
services for creating and using processes
 Process is started via the Create Process routine
which loads any dynamic link libraries that are used by
the process, and creates a primary thread
 Every dynamic link library or executable file that is
loaded into the address space of a process is identified
by an instance handle
I/O Manager
 The I/O Manager manages all the input and output
for the operating system. It supports all file system
drivers, hardware device drivers and network drivers, .
The I/O Manager provides a common interface that all
drivers, such as FAT file system driver. This allows the
I/O Manager to communicate with all drivers in the
same way, without any knowledge of how the devices
they control actually work.
Local Procedure Call Facility
 The executive system implements a message
passing facility called a Local Procedure Call
(LPC). Applications communicate with the
environment subsystems by passing messages
via the LPC facility.
Cache Manager
The Cache Manager is a part of the I/O architecture. It
handles caching for the entire I/O system. Caching is
used to improve the performance of the I/O systems.
Instead of reading and writing directly to disk,
frequently used files are temporarily stored in a cache in
memory, and read and write operations are performed to
these files in the memory.
Security Reference Monitor
 The Security Reference Monitor (SRM) is
responsible for enforcing the access validation and
audit-generation policy defined by the local security
subsystem.
Plug and Play Manager
 Plug and Play, which made its first appearance with
Microsoft Windows 95, is now a feature of Windows
2000. Changes have been made within the system
architecture of Windows 2000 to accommodate this
facility.
Device Manager
 Device Manager allows you to check the status of
your hardware devices and to update device drivers
for the hardware installed on your computer.
Environment subsystem
 Environment subsystem allow Window2000 to run
application written for different operating system. The
environment subsystem accept the API call made by the
application, convert the API call into a format that is
understood by Window 2000, and then pass the converted
API to executive components running in Kernel mode.
 Main three environment subsystem
 The Win32 subsystem
 An OS/2 subsystem
 POSIX subsystem

 The Win32
The main subsystem in windows is Win32. It
controls 32 based application and provides an
environment for Win16 and Microsoft MS-DOS based
application.
 The OS/2
During the early development of window, the
window environment become the default. Consequently
window provided only limited facilities in the os/2
environment subsystem. OS/2 1.x character based
application run on only on Window on Intel86 computer.
Real code OS/2 can run on all platform using MS-DOS
environment.
 The POSIX
 Provide APIs for POSIX based application. POSIX
developed by IEEE to ensure portability of
application across different platform.
 The POSIX subsystem is designed to
run POSIX application following the POSIX.1 standard
which is based on the UNIX model. POSIX application
can be started by the window 32 subsystem.
 These subsystem run at low priority than Kernel mode
process.
 It have less access to CPU cycles than process that run
in kernel mode.
Integral subsystem
 Integral subsystem perform essential operating system
function.
 Security
Creates security token and rights. Permission to user
account.
Accept user login request and initiates authentication.
 Workstation services
The workstation services allow a Windows 2000
computer to access the network.
Provide an API to access the network redirection

Mais conteúdo relacionado

Mais procurados

Linux architecture
Linux architectureLinux architecture
Linux architecturemcganesh
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systemsvampugani
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsMukesh Chinta
 
Features of windows
Features of windowsFeatures of windows
Features of windowsahmreenmalik
 
Linux Boot Process
Linux Boot ProcessLinux Boot Process
Linux Boot Processdarshhingu
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system pptAchyut Sinha
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application softwareSowmini Gowda
 
Linux process management
Linux process managementLinux process management
Linux process managementRaghu nath
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - OverviewAshita Agrawal
 
Architecture of operating system
Architecture of operating systemArchitecture of operating system
Architecture of operating systemSupriya Kumari
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in LinuxHenry Osborne
 
Linux booting Process
Linux booting ProcessLinux booting Process
Linux booting ProcessGaurav Sharma
 
OS Process and Thread Concepts
OS Process and Thread ConceptsOS Process and Thread Concepts
OS Process and Thread Conceptssgpraju
 
Operating system
Operating systemOperating system
Operating systemvivek anand
 
Process management in linux
Process management in linuxProcess management in linux
Process management in linuxMazenetsolution
 
History of Operating system
History of Operating systemHistory of Operating system
History of Operating systemtarun thakkar
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 

Mais procurados (20)

Linux architecture
Linux architectureLinux architecture
Linux architecture
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Features of windows
Features of windowsFeatures of windows
Features of windows
 
Linux Boot Process
Linux Boot ProcessLinux Boot Process
Linux Boot Process
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application software
 
Linux process management
Linux process managementLinux process management
Linux process management
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 
Architecture of operating system
Architecture of operating systemArchitecture of operating system
Architecture of operating system
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Linux booting Process
Linux booting ProcessLinux booting Process
Linux booting Process
 
OS Process and Thread Concepts
OS Process and Thread ConceptsOS Process and Thread Concepts
OS Process and Thread Concepts
 
Operating system
Operating systemOperating system
Operating system
 
Process management in linux
Process management in linuxProcess management in linux
Process management in linux
 
History of Operating system
History of Operating systemHistory of Operating system
History of Operating system
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Bios vs uefi
Bios vs uefiBios vs uefi
Bios vs uefi
 

Destaque

Operating Systems 1 (4/12) - Architectures (Windows)
Operating Systems 1 (4/12) - Architectures (Windows)Operating Systems 1 (4/12) - Architectures (Windows)
Operating Systems 1 (4/12) - Architectures (Windows)Peter Tröger
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsSai praveen Seva
 
Evolution of the Windows Kernel Architecture, by Dave Probert
Evolution of the Windows Kernel Architecture, by Dave ProbertEvolution of the Windows Kernel Architecture, by Dave Probert
Evolution of the Windows Kernel Architecture, by Dave Probertyang
 
Windows programming
Windows programmingWindows programming
Windows programmingBapan Maity
 
Windows programming ppt
Windows programming pptWindows programming ppt
Windows programming pptSAMIR CHANDRA
 
Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating SystemTarun Nayak
 
Win8 architecture for developers
Win8 architecture for developersWin8 architecture for developers
Win8 architecture for developersRobert MacLean
 
Kernel mode vs user mode in linux
Kernel mode vs user mode in linuxKernel mode vs user mode in linux
Kernel mode vs user mode in linuxSiddique Ibrahim
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basicsnishantsri
 
Features of windows operating system
Features of windows operating systemFeatures of windows operating system
Features of windows operating systemMohammad Alig
 
Linux command ppt
Linux command pptLinux command ppt
Linux command pptkalyanineve
 
Windows series operating system
Windows series operating systemWindows series operating system
Windows series operating systemUmmara Khan
 
17 roles of window server 2008 r2
17 roles of window server 2008 r217 roles of window server 2008 r2
17 roles of window server 2008 r2IGZ Software house
 
Computer viruses
Computer virusesComputer viruses
Computer virusestejaspaliya
 
Analysis of unix and windows
Analysis of unix and windowsAnalysis of unix and windows
Analysis of unix and windowsPartnered Health
 
Architecture of net framework
Architecture of net frameworkArchitecture of net framework
Architecture of net frameworkumesh patil
 
Buffer Overflow by SecArmour
 Buffer Overflow by SecArmour Buffer Overflow by SecArmour
Buffer Overflow by SecArmourSec Armour
 

Destaque (20)

Operating Systems 1 (4/12) - Architectures (Windows)
Operating Systems 1 (4/12) - Architectures (Windows)Operating Systems 1 (4/12) - Architectures (Windows)
Operating Systems 1 (4/12) - Architectures (Windows)
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systems
 
Evolution of the Windows Kernel Architecture, by Dave Probert
Evolution of the Windows Kernel Architecture, by Dave ProbertEvolution of the Windows Kernel Architecture, by Dave Probert
Evolution of the Windows Kernel Architecture, by Dave Probert
 
Windows programming
Windows programmingWindows programming
Windows programming
 
Windows programming ppt
Windows programming pptWindows programming ppt
Windows programming ppt
 
Window server 2008
Window server 2008Window server 2008
Window server 2008
 
Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating System
 
Win8 architecture for developers
Win8 architecture for developersWin8 architecture for developers
Win8 architecture for developers
 
Kernel mode vs user mode in linux
Kernel mode vs user mode in linuxKernel mode vs user mode in linux
Kernel mode vs user mode in linux
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
 
Features of windows operating system
Features of windows operating systemFeatures of windows operating system
Features of windows operating system
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
Windows series operating system
Windows series operating systemWindows series operating system
Windows series operating system
 
17 roles of window server 2008 r2
17 roles of window server 2008 r217 roles of window server 2008 r2
17 roles of window server 2008 r2
 
Presentation on operating system
 Presentation on operating system Presentation on operating system
Presentation on operating system
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Analysis of unix and windows
Analysis of unix and windowsAnalysis of unix and windows
Analysis of unix and windows
 
Architecture of net framework
Architecture of net frameworkArchitecture of net framework
Architecture of net framework
 
Buffer Overflow by SecArmour
 Buffer Overflow by SecArmour Buffer Overflow by SecArmour
Buffer Overflow by SecArmour
 
Windows Phone 7
Windows Phone 7Windows Phone 7
Windows Phone 7
 

Semelhante a Window architecture

Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolStacksol
 
Ch21 OS
Ch21 OSCh21 OS
Ch21 OSC.U
 
NE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptNE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptMemMem25
 
Section02-Structures.ppt
Section02-Structures.pptSection02-Structures.ppt
Section02-Structures.pptJamelPandiin2
 
Android training course
Android training courseAndroid training course
Android training courseAdarsh Pandey
 
Android and windows os
Android and windows osAndroid and windows os
Android and windows osMehakVithal
 
Chapter 1- Introduction.ppt
Chapter 1- Introduction.pptChapter 1- Introduction.ppt
Chapter 1- Introduction.pptmiki304759
 
16. Computer Systems Basic Software 2
16. Computer Systems   Basic Software 216. Computer Systems   Basic Software 2
16. Computer Systems Basic Software 2New Era University
 
Linux Device Driver,LDD,
Linux Device Driver,LDD,Linux Device Driver,LDD,
Linux Device Driver,LDD,Rahul Batra
 
linux device driver
linux device driverlinux device driver
linux device driverRahul Batra
 

Semelhante a Window architecture (20)

Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 
Os file
Os fileOs file
Os file
 
OS_Ch21
OS_Ch21OS_Ch21
OS_Ch21
 
Ch21 OS
Ch21 OSCh21 OS
Ch21 OS
 
OSCh21
OSCh21OSCh21
OSCh21
 
Operating system
Operating systemOperating system
Operating system
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
NE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptNE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.ppt
 
Section02-Structures.ppt
Section02-Structures.pptSection02-Structures.ppt
Section02-Structures.ppt
 
Android training course
Android training courseAndroid training course
Android training course
 
Operating System 2.pptx
Operating System 2.pptxOperating System 2.pptx
Operating System 2.pptx
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Android and windows os
Android and windows osAndroid and windows os
Android and windows os
 
Chapter 1- Introduction.ppt
Chapter 1- Introduction.pptChapter 1- Introduction.ppt
Chapter 1- Introduction.ppt
 
Chapter 22 - Windows XP
Chapter 22 - Windows XPChapter 22 - Windows XP
Chapter 22 - Windows XP
 
Case study windows
Case study windowsCase study windows
Case study windows
 
16. Computer Systems Basic Software 2
16. Computer Systems   Basic Software 216. Computer Systems   Basic Software 2
16. Computer Systems Basic Software 2
 
Linux Device Driver,LDD,
Linux Device Driver,LDD,Linux Device Driver,LDD,
Linux Device Driver,LDD,
 
linux device driver
linux device driverlinux device driver
linux device driver
 

Mais de IGZ Software house (20)

Types of server
Types of serverTypes of server
Types of server
 
Types of network
Types of networkTypes of network
Types of network
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
 
FSMO
FSMO FSMO
FSMO
 
Active directory domain services
Active directory domain servicesActive directory domain services
Active directory domain services
 
Raid and its levels
Raid and its levelsRaid and its levels
Raid and its levels
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
X86 Architecture
X86 Architecture X86 Architecture
X86 Architecture
 
What is-32-bit-and-64-bit
What is-32-bit-and-64-bitWhat is-32-bit-and-64-bit
What is-32-bit-and-64-bit
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Compiler
Compiler Compiler
Compiler
 
Interpreter
InterpreterInterpreter
Interpreter
 
Competitor analaysis
Competitor analaysisCompetitor analaysis
Competitor analaysis
 
Develop Android App
Develop Android AppDevelop Android App
Develop Android App
 
Technology transfer issues Related Hardware
Technology transfer issues Related HardwareTechnology transfer issues Related Hardware
Technology transfer issues Related Hardware
 

Último

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 

Último (20)

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 

Window architecture

  • 1.
  • 2. Windows Architecture  Windows 2000 architecture is the latest architecture of Windows operating system  Layered design consist of two main components user mode and kernel mode.  This structure is a modular structure, composed of several simple modules. These modules are:
  • 3.  Hardware Abstraction layer  Kernel  Executive Services  Environment Subsystem
  • 4. Modes of Windows operating system • Protected mode/Kernel mode — HAL, kernel, executive. kernel mode has unrestricted access to the system memory and external devices • User mode — collection of subsystems. User mode has limited in term of system resources they have access
  • 5.
  • 6. Hardware Abstraction Layer  It is a layer of software or programming that hides (Abstraction) the hardware differences from the operating system.  This allows Windows 2000 to be portable from one hardware platform to another.  The HAL consists of a series of function that hides or abstract differences between hardware platforms.
  • 7. Kernel  Windows Kernel is known as hybrid kernel.  The Kernel works very closely with the HAL  It schedules the activities to be performed by the CPU.  kernel synchronizes activity among processors to optimize performance.  kernel mode stops user mode services and applications from accessing critical areas of the operating system that should not have access to.  Kernel mode drivers exist in three levels. 1) Highest level drivers 2) Intermediate level drivers 3) Low level drivers
  • 8.  The Microkernel is a collection of programs that can provide tasks such as address space management, thread management and inter-process communication (IPC).  The Microkernel along with the Windows kernel to make the operating system work efficiently.
  • 9. Four main responsibilities of kernel  thread scheduling  interrupt handling  low-level processor synchronization  recovery after a power failure
  • 10. Executive Services  The Executive Services, which includes the kernel and the HAL, provides a set of common services that the user can use. This section interacts with Input/output devices, object management, process management and the system security. Each group of services is managed by one of the components of the executive services, which are as follows:
  • 11.  Object Manger  Power Manger  Process Manager  I/O Manager  Virtual memory management  Local Procedure Call Facility  Cache Manager  Security Reference Monitor  Plug and Play Monitor  Device Drive Manager
  • 12. Object Manager  The Object Manager provides rules for retention, naming and security of objects. Objects can be, for example, files and folders saved in the file system. It also removes the duplicate object resources. Creation and insertion of objects can be done in this section. Objects are manipulated by a standard set of methods, namely create, open, close, delete, query name and security
  • 13. Power Manger  The Power Manger deals with power events like power-off, stand-by, and hibernate. Windows 2000 supports all of the latest standards in Power Management including the Advanced Power Management (AMP) and Advanced Configuration and Power Interface (ACPI).  Consequently, network devices can be powered off when not in use and dynamically reactivated when network access is required.  Check network security.
  • 14. Process Manager  The Process Manager manages the creation and deletion of processes. It provides a standard set of services for creating and using processes  Process is started via the Create Process routine which loads any dynamic link libraries that are used by the process, and creates a primary thread  Every dynamic link library or executable file that is loaded into the address space of a process is identified by an instance handle
  • 15. I/O Manager  The I/O Manager manages all the input and output for the operating system. It supports all file system drivers, hardware device drivers and network drivers, . The I/O Manager provides a common interface that all drivers, such as FAT file system driver. This allows the I/O Manager to communicate with all drivers in the same way, without any knowledge of how the devices they control actually work.
  • 16. Local Procedure Call Facility  The executive system implements a message passing facility called a Local Procedure Call (LPC). Applications communicate with the environment subsystems by passing messages via the LPC facility.
  • 17. Cache Manager The Cache Manager is a part of the I/O architecture. It handles caching for the entire I/O system. Caching is used to improve the performance of the I/O systems. Instead of reading and writing directly to disk, frequently used files are temporarily stored in a cache in memory, and read and write operations are performed to these files in the memory.
  • 18. Security Reference Monitor  The Security Reference Monitor (SRM) is responsible for enforcing the access validation and audit-generation policy defined by the local security subsystem.
  • 19. Plug and Play Manager  Plug and Play, which made its first appearance with Microsoft Windows 95, is now a feature of Windows 2000. Changes have been made within the system architecture of Windows 2000 to accommodate this facility.
  • 20. Device Manager  Device Manager allows you to check the status of your hardware devices and to update device drivers for the hardware installed on your computer.
  • 21. Environment subsystem  Environment subsystem allow Window2000 to run application written for different operating system. The environment subsystem accept the API call made by the application, convert the API call into a format that is understood by Window 2000, and then pass the converted API to executive components running in Kernel mode.  Main three environment subsystem  The Win32 subsystem  An OS/2 subsystem  POSIX subsystem 
  • 22.  The Win32 The main subsystem in windows is Win32. It controls 32 based application and provides an environment for Win16 and Microsoft MS-DOS based application.  The OS/2 During the early development of window, the window environment become the default. Consequently window provided only limited facilities in the os/2 environment subsystem. OS/2 1.x character based application run on only on Window on Intel86 computer. Real code OS/2 can run on all platform using MS-DOS environment.
  • 23.  The POSIX  Provide APIs for POSIX based application. POSIX developed by IEEE to ensure portability of application across different platform.  The POSIX subsystem is designed to run POSIX application following the POSIX.1 standard which is based on the UNIX model. POSIX application can be started by the window 32 subsystem.  These subsystem run at low priority than Kernel mode process.  It have less access to CPU cycles than process that run in kernel mode.
  • 24. Integral subsystem  Integral subsystem perform essential operating system function.  Security Creates security token and rights. Permission to user account. Accept user login request and initiates authentication.  Workstation services The workstation services allow a Windows 2000 computer to access the network. Provide an API to access the network redirection