StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Design of an Operating System Performance - the Windows Kernel - Case Study Example

Cite this document
Summary
From the paper "The Design of an Operating System Performance - the Windows Kernel" it is clear that to a particular compiler, the Linux and work are considered to be the most firmly bound together. A number of language extensions are utilized by Linux that are delivered by the compiler…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
The Design of an Operating System Performance - the Windows Kernel
Read Text Preview

Extract of sample "The Design of an Operating System Performance - the Windows Kernel"

? Full Paper Table of Contents 1 3 2Introduction 3 3Open Source 4 4Materials and Tools 6 5File Organization 8 6 Structure 9 7Code Style 10 1 Abstract A number of similar facilities are provided by the Solaris, FreeBSD, windows, gun/Linux operating systems that contain kernel. Moreover, the code bases of these four are not similar and their development procedures are also considerably different. The results revealed that the four systems and their related areas of files indicate advance changes that generally utilize different procedures. The structures and internal quality characteristics are imagined for non-trivial software artifact shows primary engineering needs related to construction. 2 Introduction The view point related to the effectiveness of open source products and development procedures are generally employed externally via quality aspects, subjective evidence. In fact, a number of researches have been conducted over open source and its methodologies, the non-stop assessment associated with open source products along with parallel proprietary systems are continued exclusively. (Spinellis, 2008) In order to perform a relatively efficient research among open source coding and proprietary based systems, a recent open-source associated with the kernel of Solaris along with its distribution of the core elements that are associated with Windows based kernel source code is made available for the research facilities and institutions. (Spinellis, 2008) At this point, quality of code is considered that is composed via four core scaled industrial operating systems for instance, (Spinellis, 2008) FreeBSD, Linux, Open Solaris, and WRK abbreviated as Windows Research Kernel (wrk). The most important purpose of this research included the search for particular across-the-board code quality dissimilarities and proprietary procedures. In addition, for objectively assessment of software that is based on C involves several code quality metrics. In fact, these code quality metrics are not authenticated and are found on commonly accepted coding procedures. Therefore, it shows the uneven consent of developers that are concerned for code attributes (Spinellis 2008). 3 Open Source Open source software is defined as “software for which the human-readable source code is available for use, study, reuse, modification, enhancement, and redistribution by the users of that software” (Kennedy, 2010). As these open source software are free of cost, organizations started replacing legacy systems with open source products. This trend has forced hardware and software vendors along with proprietary technology vendors to offer value added services associated with open source products. After discussing all these advantages associated with open source software, one question comes in mind i.e. what is the purpose of spending money on proprietary software, and why do some companies do this? The answer is probably because they do not know that an open source meeting all their needs exists. For example, an open source enterprise resource planning application for Small medium business can be a cost saving alternative for expensive ERP systems such as SAP and Oracle. Linux is gaining popularity. Drivers leading to this factor include a comprehensive variety of distributions that are nearly to 200. Linux distributions have also contributed to Windows server platforms but a lot of integration efforts are still required (Brooks, 2007). However, organizations having a Windows based server environment are reliant on using Microsoft products on workstations. Although, Linux is gaining popularity for home users, as it is an open source and distributions are downloadable from the Internet. As per requirements, we will compare and discuss Fedora and Ubuntu, as they are one of the two distributions from several others. The two distributions of Linux i.e. Ubuntu and Fedora are comprehensively tracked on Distrowatch. There are lot of comparisons and dissimilarities available about these two distributions, but apart from having more or less features; there is no conclusion of declaring any one of them as a winner. Both of these Linux distributions were founded by Mark Shuttleworth. Likewise, these two distributions have marked their importance due to their demand and rapidly evolving versions bundled with features including ease of use, security, flexibility and compatibility (Gray, 1998). Unix Email program can only send text messages. It does not support binary files for example images, word documents. For sending binary files other email programs can be used. UNIX consists of two kinds of programs that handle emails: User Agent: This program provides the interface and interacts with the users for sending and receiving emails. The message sending and retrieval is connected to the transfer agent. Transfer Agent: This program does not interact directly with the user. It routes the messages to the required destinations. Linux supports a command “Finger” which is used to see how many users are logged on to the system. The command gives details as follows: User name, Full name of the person associated with the username, Terminal name, Login time, Machine from where he has connected on a specific system and idle time 4 Materials and Tools The two systems i.e. FreeBSD and Solaris possess common features; FreeBSD is programmed on BSD/Net2 based platform that is a source code of UNIX distribution that was extracted from a proprietary code of AT&T. Open Solaris is based on a very old version of UNIX that was programmed in C language and was published in 1973. Likewise, in the year 2005, Solaris source code was released by Sun microsystems with an open source license (Bovet & Cesati, 2005). It is possible for an operating system to be matured as well as state of the art simultaneously? If it is UNIX, then the answer would be “Yes.” UNIX has contributed in the Information technology sector for the last 25 years. Millions of installations conducted on various platforms and UNIX has proved to be organized and scalable. UNIX invented in 1969, by the computer scientists Dennis Ritchie and Kenneth Thompson employed at AT&T bell labs. Operating systems are compared by their functionality and performance. UNIX has contributed immensely in recent years. UNIX communication capabilities has also contributed in High performance computing sector as a company named Computer Associated International implemented a powerful system “Advantage Gen (release 6.5)”on UNIX platform to speed up the applications and web services development based on J2EE. UNIX back end server support the automatic generation of enterprise java beans facilitated the development teams to develop the J2EE application more efficiently. By the UNIX fast XML proxy support, web services are developed in no time on a distributed system as compared to the previous server architecture (Gray, 1998). IBM 32 way UNIX servers were also launched in year 2001 with the code name “Regatta”. The microprocessor architecture comprises of 1 GHz 64 Bit Power 4. This UNIX server is capable of self-healing technology and to decrease system failures. The system is capable to divide into 16 virtual servers which enable the businesses to unite several machines in to one (Gray, 1998). The Client-server model of UNIX was the core components for the growth of Internet and reshaping of the distributed systems networks. Inter process communication in the UNIX operating system involves the connection between the system components logically and physically. It supports real time network applications which allow the user to exchange messages in an interactive session. UNIX is known as a command line interface due to nonexistence of a GUI environment Today UNIX is equipped with a GUI along with dynamic communication functionalities. Some of the registered UNIX products are HP-UX, IBM AIX, SCO UnixWare, SGI IRIX, Sun Solaris etc. UNIX communication mechanism is used to transfer information between two processes. These are called pipes and are also called special files, which only save a limited amount of data. The pipe uses FIFO (First in First Out) mechanism to retrieve data. The data is written at one end of the pipe and can be read on the other end. The system cannot identify the processes that are located at the other end. The system also provides synchronization between reading and writing process. The system block the pipes already involved in processing data and constantly monitor the pipes to assure the processes are running at both ends of the pipes. The deadlock prevention is handled by the programmers. UNIX has limited the pipes to 512 K. Write ( ) un-buffered is used to add data to the pipes. The system assured that no interleaving will occur even if the pipes fill on a temporary basis. For the retrieval of data, read ( ) is used. Sockets can be divided on to two categories: Streams Stream sockets guarantees the delivery of data, in the same order as it is sent. In the process of stream socket, a connection is established, and the two ends must agree logically before sending the data. Datagram Datagram sockets do not guarantee reliable delivery of data. The connection between the two ends is not consistent. Each datagram is sent and processed separately. There is no flow control, and each datagram can use different paths to reach the destination. 5 File Organization In structuring a system, the C programming language source code file plays a vital role. The directory helps to determine the search path for files that include header file and the file formulates a possible boundary. The suitable organizations of definition and declarations interested in files and files that are interested in directories are considered as the core element of system’s modularity. In addition, these files are almost 2000 lines long. It is difficult to manage excessively long files. This is due to the dependence production and the violation of modularity. This is definite that the longest file headers such as 27,000 lines can get lumped in correctly causing error notifications initiating from thirty dissimilar regions. 6 Code Structure The code structure defines the related issues for all 4 systems. However these problems can be resolved by different methods and control structures. This will help to examine and investigate the actual problem in these systems. The extended cyclomatic metrics is considered as the measures related to the amount of independent paths that are present. This metric is specially intended to determine a program’s testability, understandability, and maintainability (Selby, 2007). Moreover, this can be a small number such as about 20, thus it allows a full body function that fulfill the developer’s needs. The percentage related to the world wide functions of the systems reveals all the elements that are observable all over the system. However, this percentage of functions as verified via hand is outrageously high. Along with same lines, the percentage reveals that the labeled statements must go on to the targets for example, an intense violations regarding structured programming principles. The labeled statements must be taken into consideration instead of only statements. This is due to the number of branches that targets more sources than any other. In addition, a single label is sometimes used as a go to statements that is to exit from a function. Even if you are performing any cleanups this method is used to exit from any application. This helps to investigate the relationship among the functions. In order to specify any incorrect separation among suppliers and buyers functionality information is needed. 7 Code Style There are numbers of options available that can help us to determine the behavior regarding indent modification. Thus well matched formatting style can be obtained for example, number of specified indentations and the placement of braces can be determined. The formatting system of each style can be obtained by running indentation on every system along with numerous values for instance, there are fifteen numerical flags. Therefore, switching again and again for every one of them is fifty five Boolean flags. Now next step is to select the set of flags that helps in production of largest numbers of conforming lines. For instance, around 74% of the lines along with default flags will be reformatted on the Open Solaris code indent. However, this number of percentage contracted to 16% from 74% if the correct flags are identified (-i8 -bli0 -cbi0 -ci4 -ip0 –bad -bbb -br -brs -ce -nbbo -ncs -nlp–npcs). The visible objects such as variables and functions along with the identifying aggregates utilized for tags (structures and unions) are the two important classes defined by C identifiers. Typically, the utilization of single name space for each class throughout the system therefore, it is mandatory to select names that are distinctive and identifiable. In addition, long names are preferred for these kinds of classes. Additional metrics define the code style. In order to determine the convention utilized for naming type defs and aggregate tags, two parallel consistency measurements are performed. In addition, classes that are unmatched to the convention are identified. There are three other ways to identify the programming practices that contain style guideline generally and they are: overly long lines of code (characters per line metric), the direct use of “magic” numbers in the code (% of numeric constants in operands), and the de?nition of function-like macros that can misbehave when placed after a statement (% unsafe function-like macros) (Oram, Wilson 2010). Commenting is considered as the second most important element regarding style. Moreover, it is not easy to determine the quality of the code comments. This is due to the fact that the comments are superfluous or incorrect. However, the density of the comments can be effortlessly measured. The procedure includes the ratio of comments and characters of comments to the statement in C files. Into the header files, it is measured as the ratio related to the defined elements that are generally present in commenting but they require explanatory comment such as enumerations, aggregates and their members, variable declarations, and function-like macros). The calculation of spellings and errors were also measured for effectiveness and quality. For this reason, spell checker with a customized dictionary comprising of identifiers of the systems and file names was incorporated. Likewise, the errors that are less in value defines that the accompanied documentation was checked by a spell checker before the release of the code. To a particular complier, the Linux and work are considered to be the most firmly bound together. A number of language extensions are utilized by Linux that are delivered by the compiler. Moreover, in a quantity of locations the assembly code is finely masked while the GCC delivers from the C language syntax. On the other hand, work utilizes less language extensions then Linux. The work depends on specific extensions to C that is supported by the Microsoft complier. Limited GCC extensions are utilized by FreeBSD kernel and frequently they are isolated inside wrapping macros. 8 References Bovet, D. P., & Cesati, M. (2005). Understanding the linux kernel O'Reilly Media. Brooks, J. (2007). The future of desktop linux. EWeek, 24(37), 16-20. Gray, J. S. (1998). Interprocess communications in unix: The nooks and crannies Prentice Hall. Kennedy, M. (2010). Evaluating open source software. Defense AT&L, 39(4), 42. Oram, A., & Wilson, G. (2010). Making software: What really works, and why we believe it O'Reilly Media. Spinellis, D. (2008). A tale of four kernels. ICSE: International Conference on Software Engineering, , 381-390. Selby, R. W. (2007). Software engineering: Barry W. boehm's lifetime contributions to software development, management, and research Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Design of an Operating System Performance Evaluation and Analysis: Research Paper”, n.d.)
The Design of an Operating System Performance Evaluation and Analysis: Research Paper. Retrieved from https://studentshare.org/information-technology/1491547-the-design-of-an-operating-system-performance
(The Design of an Operating System Performance Evaluation and Analysis: Research Paper)
The Design of an Operating System Performance Evaluation and Analysis: Research Paper. https://studentshare.org/information-technology/1491547-the-design-of-an-operating-system-performance.
“The Design of an Operating System Performance Evaluation and Analysis: Research Paper”, n.d. https://studentshare.org/information-technology/1491547-the-design-of-an-operating-system-performance.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Design of an Operating System Performance - the Windows Kernel

Earliest Microsoft Operating Systems

The paper "Earliest Microsoft Operating Systems" discusses that the windows Server 2008 will be built to ship only 64-bit.... was rather an operating environment than a complete operating system; it extended MS-DOS and shared the intrinsic problems and flaws of the latter.... This version of Windows was compatible with any Intel processor from 8086/8088 to 80286 and 80386 and could run in Standard, Real and 386 Enhanced modes, and was the first version to run Windows program in protected mode, even though 386 enhanced mode kernel was an improved version of the kernel protected mode in  Windows/386....
7 Pages (1750 words) Coursework

Real Time Embedded Systems

Moving parts like disk drives, buttons, switches etc are sensibly avoided in the design of the embedded system.... This paper outlines that in general, an embedded system is a hardware programmed for a specific task.... The functions, pertaining to the system do not require much speed.... nbsp;… As the study stresses, the software for the system is known as Firmware and is located in reading Only Memory or Flash Memory which are mostly of solid state....
10 Pages (2500 words) Assignment

Kernels of Different Operating Systems

In this scenario, Kernel is the most important element of an operating system.... ithout a doubt, the kernel is the most significant element of an operating system, and it is composed of two key elements.... The paper "Kernels of Different Operating Systems" discusses that in an operating system a kernel is a most important element, which allows an operating system to perform different critical tasks.... hellip; an operating system is a fundamental aspect of any computer system for the reason that users access and use their machines using this operating system....
12 Pages (3000 words) Coursework

Comparison of Kernels of Different Operating Systems

In this scenario, Kernel is the most important element of an operating system.... It allows an operating system to carry out some specific routines and tasks.... The paper "Comparison of Kernels of Different Operating Systems" has tried to highlight some of the fundamental aspects regarding the windows, Apple, Linux and FreeBSD based Kernel Design.... Apparently, these operating systems are applied for diverse areas and based on the popular operating system theories....
12 Pages (3000 words) Coursework

Systems Programming

nbsp; The implication is that Microsoft's developers have introduced an operating system procedure that does the same job as an exception handler but works o radically different principles.... hellip; This paper sets out to compare and contrast the Kernels of the Microsoft Windows 8 (the latest version now in current use - future versions still being under analysis and development by Microsoft), the Apple Macintosh OS X operating system [latest version], the FreeBSD operating system [latest version] and Linux [latest version]....
11 Pages (2750 words) Essay

Operating System Proposal

hellip; Though Linux Kernel alone could not make an operating system, it is matching with GNU tools marked the starting point for the current Linux operating system (Carns, Ligon, Ross, & Thakur, 2000).... Linux simply refers to an operating system.... The operating system transmits directives from an application to the processor of the computer.... The instructed task is performed by the processor and through the operating system relays the results back to the application....
10 Pages (2500 words) Literature review

Operating Systems: Windows and Linux

According to a study “A Brief History of the windows Operating System” by Curtis, Microsoft announced the development of Windows in 1983 for its own operating system called MS-DOS.... The operating system used by companies can have a great influence on their network security.... "Operating Systems: windows and Linux" paper compares two world's leading desktop Operating Systems considering the OS features such as application software availability, system requirements, end-user training needs, and security to identify the more effective OS in a business environment....
8 Pages (2000 words) Case Study

Operating Systems - Windows, Linux and Android

The paper 'Operating Systems - Windows, Linux, and Android' discussed about an operating system (OS) as the software whose primary use in computing is to run the hardware and software by enabling them to communicate.... s illustrated in figure 1 above, any version of Windows OS, ranging from Windows 2000 and the later version is segmented into the kernel mode and the user mode.... The kernel-mode runs the OS, whereas the user mode runs the environment subsystems of the OS....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us