Title: Ch' 11 System Management
1Ch. 11 - System Management
- Evaluating an Operating System
- Four Components of OS
- Measuring System Performance
- Measurement Tools
- Feedback Loops
- Monitoring
- System Security
- Ethics
- Accounting
- System System
- Performance System Security
- Accounting
- Performance
- Management
2Evaluating an Operating System
- In real-life OS, components don't work in
isolation. - Each component depends on other components.
- Most OS designed to work with certain piece of
hardware, category of processors, or specific
groups of users. - Evolved over time to operate multiple systems.
- Still favor some users computing environments.
- To evaluate OS, must understand design goals,
history, how it communicates with users, how
resources managed, what trade-offs made to
achieve goals. - Balance its strengths against its weaknesses.
3The Operating Systems Components
- Performance of any resource depends on
performance of others. - Any improvement in system made after analysis of
systems resources, requirements, managers,
users. - Key is to consider performance of entire system
not just individual components. - Memory Manager
- Processor Manager
- Device Manager
- File Manager
- Network Manager
Parts of OS
4Memory Management Schemes
- If increase memory or change to another memory
allocation scheme must consider actual operating
environment in which system resides. - Trade-off between memory use CPU overhead.
5File Management
- Secondary storage allocation schemes help user
organize and access files on system. - File organization (contiguous, non-contiguous).
- Location of a volumes directory (main memory,
disk). - Device on which files are stored.
- Different schemes offer different flexibility,
but trade-off for increased file flexibility is
increased CPU overhead.
6Processor Management Issues
- Trade-off better use of CPU versus increased
overhead, slower response time, decreased
throughput. - System could reach saturation point if CPU is
fully utilized but is allowed to accept
additional jobsresult in higher overhead less
time to run programs. - Under heavy loads, CPU time required to manage
I/O queues (which under normal circumstances
doesnt require much time) could dramatically
increase time required to run jobs. - With long queues forming at channels, control
units, I/O devices, CPU could be idle waiting
for processes to finish their I/O.
7Ways To Improve I/O Device Utilization
- Blocking reduces number of physical I/O requests,
but CPU must block later deblock records
(overhead). - Buffering helps CPU match slower speed of I/O,
but requires memory space for buffers which
reduces level of processing. - Rescheduling requests helps optimize I/O times,
but is overhead function. Speed of CPU I/O
device weighed against time to execute
reordering. - Trade-offs each of these options also increases
CPU overhead uses additional memory space.
8Network Management
- Synchronizes loads among remote processors,
determines message priorities, selects
alternative efficient communication paths over
multiple data communication lines. - Allows network administrator to monitor use of
individual computers shared hardware, ensure
compliance with software licenses. - Simplifies process of updating data files
programs on networked computers by coordinating
changes through communications server. - Security management.
9System Security
- System has conflicting needs to share resources
while protecting them. - In early days, system was physically guarded
only authorized users were allowed in vicinity. - With advent of data communication, networking,
personal computers, telecommunications software,
web sites, and e-mail, computer security much
more difficult. - When networks connected to Internet,
vulnerability need for information security
increased exponentially.
10Levels of Protection
- Depending on systems connectivity, protection
required - Computer level.
- Network level.
- Internet level.
11Techniques to Protect Hardware Software
- Passwords -- unusual combination of characters
numbers that is memorable, changed often. - Guard against intruders who use default
passwords, backdoor passwords, dictionary terms,
or social engineering. - Smart cardcredit card-sized calculator that
requires something user has with something user
knows. - Making backups performing other archiving
techniques. - Layered backup schedule used to back up entire
system weekly daily backup only files changed
during that day. - Store copies of complete system backups in safe
off-site location. - Help restore systems damaged by viruses or
disasters (e.g., fires, malfunctions, hackers).
12Techniques to Protect Hardware Software - 2
- Written policies procedures regular user
training are essential elements of system
management. - Frequent password changes.
- Reliable backup procedures.
- Guidelines for loading new software.
- Compliance with software licenses.
Recommend - Network safeguards.
- Guidelines for monitoring network activity.
- Rules for terminal access.
13Malicious or Accidental Breaches in Security
- Not all breaks in security are malicious.
- Some are only unauthorized use of resources.
- Some purposeful disruption of systems operation.
- Others purely accidental -- hardware
malfunctions, undetected errors in OS, or natural
disasters. - Federal Computer Fraud and Abuse Act of 1986.
14Security Breaches
- Denial of service attacks -- synchronized
attempts to deny service to authorized users
customers by causing computer to perform task,
often unproductive task, over over. - Accidental incomplete modification of data --
non-synchronized processes access data records
modify some but not enough of records fields. - Data values are incorrectly encoded when fields
arent large enough to hold numeric value stored
there. - Intentional unauthorized access.
- Browsing -- unauthorized users can search through
storage, directories, or files for info arent
privileged to read. - Wire tapping of data communication lines
(passive, active).
15Security Breaches - 2
- 7. Repeated trials -- method used to enter
systems that rely on passwords via program that
systematically goes through all possible
combinations until valid combination is found. - 8. Trash collection -- people read anything
thrown out by computer department for important
info used to enter system illegally. - 9. Trap doors -- unspecified non-documented
entry points to system including backdoor
passwords. - Caused by flaw in system design, installed system
programmer for future use or incorporated into
system by destructive virus or Trojan horse
program.
16System Assaults Computer Viruses
- Virus -- any unauthorized program designed to
gain access to computer system, lodge itself in
secretive way by incorporating itself into other
legitimate programs, replicate itself. - Wormit replicates itself but is a self-contained
program thats self-propagating. Worms thrive in
network environments. - Trojan Horse -- virus disguised as legitimate or
harmless program that sometimes carries within
itself means to allow program's creator to
secretly access user's system. - Logic bomb -- destructive program with time
delay. Can spread throughout network, often
unnoticed, until predetermined time when it goes
off' does its damage. - Bacteria (rabbits) -- programs that do not
explicitly damage any file. Their sole purpose is
to replicate themselves.
17Sources of Viruses
- Very mobile on networked systems (e.g., Morris
worm infected 6,000 systems one weekend in
1988). - Public bulletin boards, where easily reproduce.
- Included with illegal pirated software.
- Accidentally included in legitimate applications
software.
18Measures to Protect System From Viruses
- Level of protection is usually in proportion to
importance of its data. - Software to combat viruses available for most
systems. - Preventive programs calculate checksum for
production program store in master file. Later,
checksums compared. - Diagnostic software compares file sizes, looks
for replicating instructions, searches for
unusual file activity. - Encryptionputting it into secret code.
- Total network encryption, partial encryption,
storage encryption. - Increases systems overhead.
- System becomes totally dependent on encryption
process itself -- cant lose key!
19Network and Internet Assaults
- Network assaults include compromised web servers,
circumvented firewalls FTP telnet sites
accessed by unauthorized users. - System vulnerabilities include file downloads,
e-mail exchange, fire walls, Internet
connections, etc - No guaranteed method of protection against system
assaults since evolve over time. - Sniffers (packet sniffers) -- peruse data packets
as they pass by, examine each for specific info,
log copies of interesting packets for more
detailed examination. - Spoofing -- assailant falsifies IP addresses of
Internet server by changing address recorded it
packets it sends over Internet. - E-mail transmissions may allow attachment of
rouge programs, macro viruses, or other
destructive code.
20Computer Industry Associated With Lack of Ethical
Behavior
- Seemingly conflicting needs of users
individuals need for privacy, organizations
need to protect proprietary info, publics right
to know. - Illegally copied software -- lawsuits large
fines per transgression. - Plagiarism -- illegal and punishable by law in
United States. - Eavesdropping on E-mail, data, or voice
communications is sometimes illegal and usually
unwarranted, except under certain circumstances. - Cracking (hacking) -- gaining access to another's
computer system to monitor or change data, and
its seldom an ethical activity.. - Unethical use of technology (unauthorized access
to private or protected computer systems or
electronic information) -- murky area of law, but
clearly wrong thing to do.
21How Can Users Be Taught to Behave Ethically?
- Continuing series of security awareness ethics
communications to computer users is more
effective. - Publish policies clearly stating which actions
will/will not be condoned. - Teach regular seminar including real-life case
histories. - Conduct open discussions of ethical questions
- Is it okay to read someone elses E-mail?
- Is it ethical for a competitor to read your data?
- Is it okay if someone scans your bank account?
- Is it right for someone to change results of your
medical test? - Is it acceptable for someone to copy your
software program and put it on the Internet?
22Measuring System Performance
- Total system performance -- the efficiency with
which a computer system meets its goals. - Not easy to measure system efficiency because
affected by user programs, OS programs,
hardware units. - System performance can be very subjective
difficult to quantify. - Even when performance is quantifiable (e.g.,
number of disk accesses per minute), it is
relative. - Based on interactions of 3 components workload
being handled by system.
23Measurement Tools
- Throughput.
- Capacity. Measures of
- Response time. system
- Turnaround time. performance
- Resource utilization.
- Availability.
- Reliability.
- Measures of performance cant be taken in
isolation from workload being handled by system.
24Throughput Capacity Measures
- Throughput -- indicates productivity of system as
whole. - Measured under steady-state conditions.
- Gives the number of jobs processed per day or
the number of on-line transactions handled per
hour. - Also measures volume of work handled by computer
system unit. - Bottlenecks tend to develop when resources reach
their capacity (maximum throughput level). - Resource becomes saturated processes in system
arent being passed along. - When main memory over-committed level of
multiprogramming has peaked. - Thrashing results from saturated disk drive
25Response or Turnaround Time Measure
- Response time -- interval required to process
users request from when user presses key to send
message until system indicates receipt of
message. - Important to on-line interactive users.
- Turnaround time -- time from submission of job
until its output is returned to user in batch
jobs. - Measure depends on workload handled by system at
request time on job/request type submitted. - To accurately measure system predictability,
response time turnaround time must include
their average variance.
26Resource Utilization Availability Measures
- Resource utilization -- measure of how much each
unit is contributing to overall operation. - Given as a percentage of time that resource is
actually in use. - Helps determine if balance among units of system
or if system is I/O-bound or CPU-bound. - Availability -- indicates likelihood that
resource will be ready when user needs it. - Unit will be operational not out of service a
user needs it. - Mean time between failures (MTBF).
- Mean time to repair (MTTR).
27MTBF MTTR
- Mean time between failures (MTBF) -- average time
that a unit is operational before it breaks down. - Mean time to repair (MTTR) -- average time needed
to fix a failed unit and put it back in service. - Availability (A) MTBF . MTBF
MTTR -
-
28Reliability
- Measures probability that unit will not fail
during a given time period and its a function of
MTBF. - R(t) e(1/MTBF)(t)
-
- where e is mathematical constant approximately
equal to 2.71828.
29Feedback Loops
- To prevent processor from spending more time
doing overhead than executing jobs, OS
continuously monitors system feed info to Job
Scheduler -- feedback loop. - Scheduler allow more jobs to enter the system or
prevent new jobs from entering until some
congestion relieved. - Negative feedback loop mechanism monitors system
, when it becomes too congested, signals
appropriate manager to slow down arrival rate of
processes. - Positive feedback loop mechanism monitors system,
when system becomes underutilized, causes
arrival rate to increase. - Used in paged virtual memory systems.
30Monitoring
- Hardware monitors are more expensive but have
minimum impact on system because theyre outside
of it attached electronically. - E.g., hard-wired counters, clocks, and
comparative elements. - Software monitors are relatively inexpensive but
because they become part of system they can
distort results of analysis. - Tools developed for each specific system
difficult to move. - System measurements include other hardware units
OS, compilers, other system software. - Measurements are made in a variety of ways.
- Benchmarks, simulation models.
31Accounting
- Most computer system resources are paid for by
users. - With single user -- easy to calculate cost of
system. - In a multi-user environment, costs distributed
among users based on how much each uses systems
resources. - OS sets up user accounts, assigns passwords,
identifies which resources available to each
user, defines quotas for available resources
(e.g., disk space or max. CPU time per job). - To calculate cost of whole system, accounting
program must collect info on each active user.
32Pricing Policies
- Total amount of time spent between job submission
and completion - Connect time -- in interactive environments this
is the time from log-in to log-out. - CPU time is time spent by the processor executing
job. - Main memory usage in units of time, bytes of
storage, or bytes of storage multiplied by units
of time. - Secondary storage used during program execution
can be given in units of time or space, or both. - Secondary storage used during the billing period
is usually given in terms of number of disk
tracks allocated.
33Pricing Policies - 2
- Use of system software includes utility packages,
compilers, and/or databases. - Number of I/O operations -- usually grouped by
device class line printer, terminal, and disks. - Time spent waiting for I/O completion.
- Number of input records read -- usually grouped
by type of input device. - Number of output records printed -- usually
grouped by type of output device. - Number of page faults -- reported in paging
systems.
34Pricing Incentives
- Convince users to distribute their workload to
system managers advantage. - Encourage users to access more plentiful and
cheap resources rather than those that are scarce
and expensive.
35Billing Information
- Some systems only give info on resource use.
- Other systems also calculate price of most costly
items (e.g., CPU utilization, disk storage use,
supplies) at end of every job. - Advantage of maintaining billing records on-line
-- status of each user checked before users job
is allowed to enter READY queue.. - Disadvantage is overhead.
- Memory space is used CPU processing is
increased. - Can defer accounting program until off-hours,
when system is lightly loaded.
36Terminology
- availability
- backups
- benchmarks
- browsing
- capacity
- encryption
- ethics
- feedback loop
- logic bomb
- mean time between failures (MTBF)
- mean time to repair (MTTR)
- negative feedback loop
- password
- pirated software
- positive feedback loop
- reliability
- resource utilization
- response time
37Terminology - 2
- smart card
- sniffers
- spoofing
- throughput
- trap door
- Trojan horse
- turnaround time
- virus
- wire tapping
- worm