An operating system (OS) is
system software that manages
computer hardware
Computer hardware includes the physical parts of a computer, such as the computer case, case, central processing unit (CPU), Random-access memory, random access memory (RAM), Computer monitor, monitor, Computer mouse, mouse, Computer keyboard, ...
,
software resources, and provides common
services for
computer programs.
Time-sharing operating systems
schedule tasks for efficient use of the system and may also include accounting software for cost allocation of
processor time,
mass storage, printing, and other resources.
For hardware functions such as
input and output and
memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes
system calls to an OS function or is
interrupted by it. Operating systems are found on many devices that contain a computer from cellular phones and video game consoles to
web server
A web server is computer software and underlying hardware that accepts requests via HTTP (the network protocol created to distribute web content) or its secure variant HTTPS. A user agent, commonly a web browser or web crawler, initiate ...
s and
supercomputer
A supercomputer is a computer with a high level of performance as compared to a general-purpose computer. The performance of a supercomputer is commonly measured in floating-point operations per second ( FLOPS) instead of million instructions ...
s.
The dominant general-purpose
personal computer operating system is
Microsoft Windows
Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
with a market share of around 74.99%.
macOS by
Apple Inc. is in second place (14.84%), and the varieties of
Linux are collectively in third place (2.81%).
In the
mobile
Mobile may refer to:
Places
* Mobile, Alabama, a U.S. port city
* Mobile County, Alabama
* Mobile, Arizona, a small town near Phoenix, U.S.
* Mobile, Newfoundland and Labrador
Arts, entertainment, and media Music Groups and labels
* Mobile ...
sector (including smartphones and
tablets),
Android's share is 70.82% in the year 2020. According to third quarter 2016 data, Android's share on smartphones is dominant with 87.5 percent with a growth rate of 10.3 percent per year, followed by Apple's
iOS with 12.1 percent with per year decrease in market share of 5.2 percent, while other operating systems amount to just 0.3 percent.
Linux distribution
A Linux distribution (often abbreviated as distro) is an operating system made from a software collection that includes the Linux kernel and, often, a package management system. Linux users usually obtain their operating system by downloading one ...
s are dominant in the server and supercomputing sectors. Other specialized classes of operating systems (special-purpose operating systems),
such as
embedded and real-time systems, exist for many applications.
Security-focused operating systems also exist. Some operating systems have low system requirements (e.g.
light-weight Linux distribution). Others may have higher system requirements.
Some operating systems require installation or may come pre-installed with purchased computers (
OEM-installation), whereas others may run directly from media (i.e.
live CD) or flash memory (i.e.
USB stick).
Types of operating systems
Single-tasking and multi-tasking
A single-tasking system can only run one program at a time, while a
multi-tasking operating system allows more than one program to be running
concurrently. This is achieved by
time-sharing, where the available processor time is divided between multiple processes. These processes are each interrupted repeatedly in
time slices by a task-scheduling subsystem of the operating system. Multi-tasking may be characterized in preemptive and cooperative types. In
preemptive multitasking, the operating system slices the
CPU
A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and ...
time and dedicates a slot to each of the programs.
Unix-like operating systems, such as
Linux—as well as non-Unix-like, such as
AmigaOS—support preemptive multitasking. Cooperative multitasking is achieved by relying on each process to provide time to the other processes in a defined manner.
16-bit
16-bit microcomputers are microcomputers that use 16-bit microprocessors.
A 16-bit register can store 216 different values. The range of integer values that can be stored in 16 bits depends on the integer representation used. With the two mos ...
versions of Microsoft Windows used cooperative multi-tasking;
32-bit
In computer architecture, 32-bit computing refers to computer systems with a processor, memory, and other major system components that operate on data in 32-bit units. Compared to smaller bit widths, 32-bit computers can perform large calculation ...
versions of both Windows NT and Win9x used preemptive multi-tasking.
Single- and multi-user
Single-user operating systems have no facilities to distinguish users but may allow multiple programs to run in
tandem. A
multi-user operating system extends the basic concept of multi-tasking with facilities that identify processes and resources, such as disk space, belonging to multiple users, and the system permits multiple users to interact with the system at the same time. Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources to multiple users.
Distributed
A
distributed operating system manages a group of distinct,
networked computers and makes them appear to be a single computer, as all computations are
distributed (divided amongst the constituent computers).
Embedded
Embedded operating systems are designed to be used in
embedded computer systems. They are designed to operate on small machines with less autonomy (e.g.
PDAs). They are very compact and extremely efficient by design and are able to operate with a limited amount of resources.
Windows CE and
Minix 3 are some examples of embedded operating systems.
Real-time
A
real-time operating system is an operating system that guarantees to process
events or data by a specific moment in time. A real-time operating system may be single- or multi-tasking, but when multitasking, it uses specialized scheduling algorithms so that a
deterministic
Determinism is a philosophical view, where all events are determined completely by previously existing causes. Deterministic theories throughout the history of philosophy have developed from diverse and sometimes overlapping motives and consi ...
nature of behavior is achieved. Such an event-driven system switches between tasks based on their priorities or external events, whereas time-sharing operating systems switch tasks based on clock
interrupts.
Library
A library operating system is one in which the services that a typical operating system provides, such as networking, are provided in the form of
libraries and composed with the application and configuration code to construct a
unikernel: a specialized,
single address space, machine image that can be deployed to cloud or embedded environments.
History
Early computers were built to perform a series of single tasks, like a calculator. Basic operating system features were developed in the 1950s, such as
resident monitor functions that could automatically run different programs in succession to speed up processing. Operating systems did not exist in their modern and more complex forms until the early 1960s.
Hardware features were added, that enabled use of
runtime libraries,
interrupts, and
parallel processing. When
personal computers became popular in the 1980s, operating systems were made for them similar in concept to those used on larger computers.
In the 1940s, the earliest electronic digital systems had no operating systems. Electronic systems of this time were programmed on rows of mechanical switches or by jumper wires on
plugboards. These were special-purpose systems that, for example, generated ballistics tables for the military or controlled the printing of payroll checks from data on punched paper cards. After programmable general-purpose computers were invented,
machine languages(consisting of strings of the binary digits 0 and 1 on punched paper tape) were introduced that sped up the programming process (Stern, 1981).

In the early 1950s, a computer could execute only one program at a time. Each user had sole use of the computer for a limited period and would arrive at a scheduled time with their program and data on punched paper cards or
punched tape. The program would be loaded into the machine, and the machine would be set to work until the program completed or
crashed
"Crashed" is the third U.S. rock single, (the fifth overall), from the band Daughtry's debut album. It was released only to U.S. rock stations on September 5, 2007. Upon its release the song got adds at those stations, along with some Alternativ ...
. Programs could generally be debugged via a front panel using toggle switches and panel lights. It is said that
Alan Turing was a master of this on the early
Manchester Mark 1 machine, and he was already deriving the primitive conception of an operating system from the principles of the
universal Turing machine.
Later machines came with libraries of programs, which would be linked to a user's program to assist in operations such as input and output and
compiling (generating machine code from human-readable
symbolic code). This was the genesis of the modern-day operating system. However, machines still ran a single job at a time. At Cambridge University in England, the job queue was at one time a washing line (clothesline) from which tapes were hung with different colored clothes-pegs to indicate job priority.
By the late 1950s, programs that one would recognize as an operating system were beginning to appear. Often pointed to as the earliest recognizable example is
GM-NAA I/O, released in 1956 on the
IBM 704
The IBM 704 is a large digital mainframe computer introduced by IBM in 1954. It was the first mass-produced computer with hardware for floating-point arithmetic. The IBM 704 ''Manual of operation'' states:
The type 704 Electronic Data-Pro ...
. The first known example that actually referred to itself was the
SHARE Operating System, a development of GM-NAA I/O, released in 1959. In a May 1960 paper describing the system, George Ryckman noted:
One of the more famous examples that is often found in discussions of early systems is the
Atlas Supervisor, running on the
Atlas in 1962. It was referred to as such in a December 1961 article describing the system, but the context of "the Operating System" is more along the lines of "the system operates in the fashion". The Atlas team itself used the term "supervisor", which was widely used along with "monitor".
Brinch Hansen described it as "the most significant breakthrough in the history of operating systems."
Mainframes
Through the 1950s, many major features were pioneered in the field of operating systems on
mainframe computer
A mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk data processing for tasks such as censuses, industry and consumer statistics, enterpris ...
s, including
batch processing, input/output
interrupting,
buffering,
multitasking,
spooling,
runtime libraries,
link-loading, and programs for
sorting
Sorting refers to ordering data in an increasing or decreasing manner according to some linear relationship among the data items.
# ordering: arranging items in a sequence ordered by some criterion;
# categorizing: grouping items with similar pro ...
records in files. These features were included or not included in application software at the option of application programmers, rather than in a separate operating system used by all applications. In 1959, the
SHARE Operating System was released as an integrated utility for the
IBM 704
The IBM 704 is a large digital mainframe computer introduced by IBM in 1954. It was the first mass-produced computer with hardware for floating-point arithmetic. The IBM 704 ''Manual of operation'' states:
The type 704 Electronic Data-Pro ...
, and later in the
709
__NOTOC__
Year 709 ( DCCIX) was a common year starting on Tuesday (link will display the full calendar) of the Julian calendar. The denomination 709 for this year has been used since the early medieval period, when the Anno Domini calendar era ...
and
7090 mainframes, although it was quickly supplanted by
IBSYS/IBJOB on the 709, 7090 and 7094, which in turn influenced the later 7040-PR-150 (
7040/7044) and 1410-PR-155 (
1410
Year 1410 ( MCDX) was a common year starting on Wednesday (link will display the full calendar) of the Julian calendar.
Events
January–December
* March 25 – The first of the Yongle Emperor's campaigns against the Mongols is ...
/
7010) operating systems.
During the 1960s, IBM's
OS/360 introduced the concept of a single OS spanning an entire product line, which was crucial for the success of the System/360 machines. IBM's current mainframe operating systems are
distant descendants of this original system and modern machines are
backward compatible with applications written for OS/360.
OS/360 also pioneered the concept that the operating system keeps track of all of the system resources that are used, including program and data space allocation in main memory and file space in secondary storage, and
file locking during updates. When a process is terminated for any reason, all of these resources are re-claimed by the operating system.
The alternative
CP-67 system for the
S/360-67 started a whole line of IBM operating systems focused on the concept of
virtual machines. Other operating systems used on IBM S/360 series mainframes included systems developed by IBM:
DOS/360
Disk Operating System/360, also DOS/360, or simply DOS, is the discontinued first member of a sequence of operating systems for IBM System/360, System/370 and later mainframes. It was announced by IBM on the last day of 1964, and it was first d ...
(Disk Operating System),
TSS/360 (Time Sharing System),
TOS/360
Disk Operating System/360, also DOS/360, or simply DOS, is the discontinued first member of a sequence of operating systems for IBM System/360, System/370 and later mainframes. It was announced by IBM on the last day of 1964, and it was first ...
(Tape Operating System),
BOS/360
Basic Operating System/360 (BOS/360) was an early IBM System/360 operating system.
Origin
BOS was one of four System/360 Operating System versions developed by the IBM General Products Division (GPD) in Endicott, New York to fill a gap at t ...
(Basic Operating System), and
ACP (Airline Control Program), as well as a few non-IBM systems:
MTS (Michigan Terminal System),
MUSIC (Multi-User System for Interactive Computing), and
ORVYL (Stanford Timesharing System).
Control Data Corporation
Control Data Corporation (CDC) was a mainframe and supercomputer firm. CDC was one of the nine major United States computer companies through most of the 1960s; the others were IBM, Burroughs Corporation, DEC, NCR, General Electric, Honeywel ...
developed the
SCOPE
Scope or scopes may refer to:
People with the surname
* Jamie Scope (born 1986), English footballer
* John T. Scopes (1900–1970), central figure in the Scopes Trial regarding the teaching of evolution
Arts, media, and entertainment
* CinemaS ...
operating system in the 1960s, for
batch processing. In cooperation with the University of Minnesota, the
Kronos and later the
NOS operating systems were developed during the 1970s, which supported simultaneous batch and timesharing use. Like many commercial timesharing systems, its interface was an extension of the Dartmouth
BASIC
BASIC (Beginners' All-purpose Symbolic Instruction Code) is a family of general-purpose, high-level programming languages designed for ease of use. The original version was created by John G. Kemeny and Thomas E. Kurtz at Dartmouth College ...
operating systems, one of the pioneering efforts in timesharing and programming languages. In the late 1970s, Control Data and the University of Illinois developed the
PLATO operating system, which used plasma panel displays and long-distance time sharing networks. Plato was remarkably innovative for its time, featuring real-time chat, and multi-user graphical games.
In 1961,
Burroughs Corporation introduced the
B5000 with the
MCP (Master Control Program) operating system. The B5000 was a
stack machine
In computer science, computer engineering and programming language implementations, a stack machine is a computer processor or a virtual machine in which the primary interaction is moving short-lived temporary values to and from a push down st ...
designed to exclusively support high-level languages with no assembler; indeed, the MCP was the first OS to be written exclusively in a high-level language (
ESPOL, a dialect of
ALGOL). MCP also introduced many other ground-breaking innovations, such as being the first commercial implementation of
virtual memory. During development of the
AS/400, IBM made an approach to Burroughs to license MCP to run on the AS/400 hardware. This proposal was declined by Burroughs management to protect its existing hardware production. MCP is still in use today in the
Unisys company's
MCP/ClearPath line of computers.
UNIVAC, the first commercial computer manufacturer, produced a series of EXEC operating systems. Like all early main-frame systems, this batch-oriented system managed magnetic drums, disks, card readers and line printers. In the 1970s, UNIVAC produced the Real-Time Basic (RTB) system to support large-scale time sharing, also patterned after the Dartmouth BC system.
General Electric developed General Electric Comprehensive Operating Supervisor (GECOS), which primarily supported batch processing. After its acquisition by
Honeywell, it was renamed
General Comprehensive Operating System (GCOS).
Bell Labs,
General Electric and
MIT developed Multiplexed Information and Computing Service (
Multics), which introduced the concept of ringed security privilege levels.
Digital Equipment Corporation developed many operating systems for its various computer lines, including
TOPS-10 and
TOPS-20 time-sharing systems for the 36-bit PDP-10 class systems. Before the widespread use of UNIX, TOPS-10 was a particularly popular system in universities, and in the early
ARPANET community.
RT-11 was a single-user real-time OS for the
PDP-11
The PDP-11 is a series of 16-bit minicomputers sold by Digital Equipment Corporation (DEC) from 1970 into the 1990s, one of a set of products in the Programmed Data Processor (PDP) series. In total, around 600,000 PDP-11s of all models were sold, ...
class minicomputer, and
RSX-11 was the corresponding multi-user OS.
From the late 1960s through the late 1970s, several hardware capabilities evolved that allowed similar or ported software to run on more than one system. Early systems had utilized
microprogramming to implement features on their systems in order to permit different underlying
computer architectures to appear to be the same as others in a series. In fact, most 360s after the 360/40 (except the 360/44, 360/75, 360/91, 360/95 and 360/195) were microprogrammed implementations.
The enormous investment in software for these systems made since the 1960s caused most of the original computer manufacturers to continue to develop compatible operating systems along with the hardware. Notable supported mainframe operating systems include:
*
Burroughs MCP
The MCP (Master Control Program) is the operating system of the Burroughs small, medium and large systems, including the Unisys Clearpath/MCP systems.
MCP was originally written in 1961 in ESPOL (Executive Systems Problem Oriented Language). In ...
B5000, 1961 to
Unisys Clearpath/MCP, present
* IBM
OS/360 IBM System/360
The IBM System/360 (S/360) is a family of mainframe computer systems that was announced by IBM on April 7, 1964, and delivered between 1965 and 1978. It was the first family of computers designed to cover both commercial and scientific applica ...
, 1966 to IBM
z/OS, present
* IBM
CP-67 IBM System/360
The IBM System/360 (S/360) is a family of mainframe computer systems that was announced by IBM on April 7, 1964, and delivered between 1965 and 1978. It was the first family of computers designed to cover both commercial and scientific applica ...
, 1967 to IBM
z/VM
* UNIVAC
EXEC 8 UNIVAC 1108, 1967, to
OS 2200
OS 2200 is the operating system for the Unisys ClearPath Dorado family of mainframe systems. The operating system kernel of OS 2200 is a lineal descendant of Exec 8 for the UNIVAC 1108.
Documentation and other information on current and past Un ...
Unisys Clearpath Dorado, present
Microcomputers

The first
microcomputer
A microcomputer is a small, relatively inexpensive computer having a central processing unit (CPU) made out of a microprocessor. The computer also includes memory and input/output (I/O) circuitry together mounted on a printed circuit board (PC ...
s did not have the capacity or need for the elaborate operating systems that had been developed for mainframes and minis; minimalistic operating systems were developed, often loaded from
ROM and known as ''
monitors''. One notable early
disk operating system was
CP/M
CP/M, originally standing for Control Program/Monitor and later Control Program for Microcomputers, is a mass-market operating system created in 1974 for Intel 8080/ 85-based microcomputers by Gary Kildall of Digital Research, Inc. Initial ...
, which was supported on many early microcomputers and was closely imitated by
Microsoft's
MS-DOS, which became widely popular as the operating system chosen for the
IBM PC
The IBM Personal Computer (model 5150, commonly known as the IBM PC) is the first microcomputer released in the IBM PC model line and the basis for the IBM PC compatible de facto standard. Released on August 12, 1981, it was created by a team ...
(IBM's version of it was called IBM DOS or
PC DOS). In the 1980s, Apple Computer Inc. (now
Apple Inc.) abandoned its popular
Apple II
The Apple II (stylized as ) is an 8-bit home computer and one of the world's first highly successful mass-produced microcomputer products. It was designed primarily by Steve Wozniak; Jerry Manock developed the design of Apple II's foam-m ...
series of microcomputers to introduce the
Apple Macintosh computer with an innovative
graphical user interface (GUI) to the
Mac OS.
The introduction of the
Intel 80386 CPU chip in October 1985, with
32-bit
In computer architecture, 32-bit computing refers to computer systems with a processor, memory, and other major system components that operate on data in 32-bit units. Compared to smaller bit widths, 32-bit computers can perform large calculation ...
architecture and
paging capabilities, provided personal computers with the ability to run
multitasking operating systems like those of earlier
minicomputer
A minicomputer, or colloquially mini, is a class of smaller general purpose computers that developed in the mid-1960s and sold at a much lower price than mainframe and mid-size computers from IBM and its direct competitors. In a 1970 survey, ...
s and
mainframes. Microsoft responded to this progress by hiring
Dave Cutler, who had developed the
VMS #REDIRECT VMS
{{redirect category shell, {{R from other capitalisation{{R from ambiguous page ...
operating system for
Digital Equipment Corporation. He would lead the development of the
Windows NT operating system, which continues to serve as the basis for Microsoft's operating systems line.
Steve Jobs
Steven Paul Jobs (February 24, 1955 – October 5, 2011) was an American entrepreneur, industrial designer, media proprietor, and investor. He was the co-founder, chairman, and CEO of Apple; the chairman and majority shareholder of Pixar; a ...
, a co-founder of
Apple Inc., started
NeXT Computer Inc., which developed the
NEXTSTEP operating system. NEXTSTEP would later be acquired by
Apple Inc. and used, along with code from
FreeBSD
FreeBSD is a free and open-source Unix-like operating system descended from the Berkeley Software Distribution (BSD), which was based on Research Unix. The first version of FreeBSD was released in 1993. In 2005, FreeBSD was the most popular ...
as the core of
Mac OS X (macOS after latest name change).
The
GNU Project was started by activist and programmer
Richard Stallman with the goal of creating a complete
free software replacement to the proprietary
UNIX operating system. While the project was highly successful in duplicating the functionality of various parts of UNIX, development of the
GNU Hurd kernel proved to be unproductive. In 1991, Finnish computer science student
Linus Torvalds, with cooperation from volunteers collaborating over the Internet, released the first version of the
Linux kernel
The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel. It was originally authored in 1991 by Linus Torvalds for his i386-based PC, and it was soon adopted as the kernel for the GNU ope ...
. It was soon merged with the GNU
user space components and
system software to form a complete operating system. Since then, the combination of the two major components has usually been referred to as simply "Linux" by the software industry, a naming convention that Stallman and the
Free Software Foundation remain opposed to, preferring the name GNU/Linux. The Berkeley Software Distribution, known as
BSD, is the UNIX derivative distributed by the University of California, Berkeley, starting in the 1970s. Freely distributed and
ported to many minicomputers, it eventually also gained a following for use on PCs, mainly as
FreeBSD
FreeBSD is a free and open-source Unix-like operating system descended from the Berkeley Software Distribution (BSD), which was based on Research Unix. The first version of FreeBSD was released in 1993. In 2005, FreeBSD was the most popular ...
,
NetBSD
NetBSD is a free and open-source Unix operating system based on the Berkeley Software Distribution (BSD). It was the first open-source BSD descendant officially released after 386BSD was forked. It continues to be actively developed and is a ...
and
OpenBSD
OpenBSD is a security-focused, free and open-source, Unix-like operating system based on the Berkeley Software Distribution (BSD). Theo de Raadt created OpenBSD in 1995 by forking NetBSD 1.0. According to the website, the OpenBSD project em ...
.
Examples
Unix and Unix-like operating systems
File:Unix history-simple.png, 256px, Evolution of Unix systems
default
Unix was originally written in
assembly language
In computer programming, assembly language (or assembler language, or symbolic machine code), often referred to simply as Assembly and commonly abbreviated as ASM or asm, is any low-level programming language with a very strong correspondence be ...
.
Ken Thompson wrote
B, mainly based on
BCPL
BCPL ("Basic Combined Programming Language") is a procedural, imperative, and structured programming language. Originally intended for writing compilers for other languages, BCPL is no longer in common use. However, its influence is still ...
, based on his experience in the
MULTICS project. B was replaced by
C, and Unix, rewritten in C, developed into a large, complex family of inter-related operating systems which have been influential in every modern operating system (see
History).
The ''
Unix-like'' family is a diverse group of operating systems, with several major sub-categories including
System V,
BSD, and
Linux. The name "
UNIX" is a trademark of
The Open Group which licenses it for use with any operating system that has been shown to conform to their definitions. "UNIX-like" is commonly used to refer to the large set of operating systems which resemble the original UNIX.
Unix-like systems run on a wide variety of
computer architectures. They are used heavily for
servers in business, as well as
workstations in academic and engineering environments.
Free
Free may refer to:
Concept
* Freedom, having the ability to do something, without having to obey anyone/anything
* Freethought, a position that beliefs should be formed only on the basis of logic, reason, and empiricism
* Emancipate, to procur ...
UNIX variants, such as
Linux and
BSD, are popular in these areas.
Five operating systems are certified by
The Open Group (holder of the Unix trademark) as Unix. HP's
HP-UX
HP-UX (from "Hewlett Packard Unix") is Hewlett Packard Enterprise's proprietary implementation of the Unix operating system, based on Unix System V (initially System III) and first released in 1984. Current versions support HPE Integrity Ser ...
and IBM's
AIX are both descendants of the original System V Unix and are designed to run only on their respective vendor's hardware. In contrast,
Sun Microsystems
Sun Microsystems, Inc. (Sun for short) was an American technology company that sold computers, computer components, software, and information technology services and created the Java programming language, the Solaris operating system, ZFS, the ...
's
Solaris can run on multiple types of hardware, including
x86 and
SPARC servers, and PCs. Apple's
macOS, a replacement for Apple's earlier (non-Unix)
classic Mac OS
Mac OS (originally System Software; retronym: Classic Mac OS) is the series of operating systems developed for the Macintosh family of personal computers by Apple Computer from 1984 to 2001, starting with System 1 and ending with Mac OS 9. The ...
, is a
hybrid kernel-based BSD variant derived from
NeXTSTEP,
Mach
Mach may refer to Mach number, the speed of sound in local conditions. It may also refer to:
Computing
* Mach (kernel), an operating systems kernel technology
* ATI Mach, a 2D GPU chip by ATI
* GNU Mach, the microkernel upon which GNU Hurd is bas ...
, and
FreeBSD
FreeBSD is a free and open-source Unix-like operating system descended from the Berkeley Software Distribution (BSD), which was based on Research Unix. The first version of FreeBSD was released in 1993. In 2005, FreeBSD was the most popular ...
. IBM's
z/OS UNIX System Services includes a shell and utilities based on
Mortice Kerns' InterOpen products.
Unix interoperability was sought by establishing the
POSIX standard. The POSIX standard can be applied to any operating system, although it was originally created for various Unix variants.
BSD and its descendants
A subgroup of the Unix family is the
Berkeley Software Distribution
The Berkeley Software Distribution or Berkeley Standard Distribution (BSD) is a discontinued operating system based on Research Unix, developed and distributed by the Computer Systems Research Group (CSRG) at the University of California, Berk ...
family, which includes
FreeBSD
FreeBSD is a free and open-source Unix-like operating system descended from the Berkeley Software Distribution (BSD), which was based on Research Unix. The first version of FreeBSD was released in 1993. In 2005, FreeBSD was the most popular ...
,
NetBSD
NetBSD is a free and open-source Unix operating system based on the Berkeley Software Distribution (BSD). It was the first open-source BSD descendant officially released after 386BSD was forked. It continues to be actively developed and is a ...
, and
OpenBSD
OpenBSD is a security-focused, free and open-source, Unix-like operating system based on the Berkeley Software Distribution (BSD). Theo de Raadt created OpenBSD in 1995 by forking NetBSD 1.0. According to the website, the OpenBSD project em ...
. These operating systems are most commonly found on
webserver
A web server is computer software and underlying hardware that accepts requests via HTTP (the network protocol created to distribute web content) or its secure variant HTTPS. A user agent, commonly a web browser or web crawler, in ...
s, although they can also function as a personal computer OS. The Internet owes much of its existence to BSD, as many of the protocols now commonly used by computers to connect, send and receive data over a network were widely implemented and refined in BSD. The
World Wide Web was also first demonstrated on a number of computers running an OS based on BSD called
NeXTSTEP.
In 1974,
University of California, Berkeley installed its first Unix system. Over time, students and staff in the computer science department there began adding new programs to make things easier, such as text editors. When Berkeley received new
VAX computers in 1978 with Unix installed, the school's undergraduates modified Unix even more in order to take advantage of the computer's hardware possibilities. The
Defense Advanced Research Projects Agency
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.
Originally known as the Adv ...
of the US
Department of Defense took interest, and decided to fund the project. Many schools, corporations, and government organizations took notice and started to use Berkeley's version of Unix instead of the official one distributed by AT&T.
Steve Jobs
Steven Paul Jobs (February 24, 1955 – October 5, 2011) was an American entrepreneur, industrial designer, media proprietor, and investor. He was the co-founder, chairman, and CEO of Apple; the chairman and majority shareholder of Pixar; a ...
, upon leaving Apple Inc. in 1985, formed
NeXT Inc., a company that manufactured high-end computers running on a variation of BSD called
NeXTSTEP. One of these computers was used by
Tim Berners-Lee
Sir Timothy John Berners-Lee (born 8 June 1955), also known as TimBL, is an English computer scientist best known as the inventor of the World Wide Web. He is a Professorial Fellow of Computer Science at the University of Oxford and a profess ...
as the first webserver to create the World Wide Web.
Developers like
Keith Bostic encouraged the project to replace any non-free code that originated with Bell Labs. Once this was done, however, AT&T sued. After two years of legal disputes, the BSD project spawned a number of free derivatives, such as
NetBSD
NetBSD is a free and open-source Unix operating system based on the Berkeley Software Distribution (BSD). It was the first open-source BSD descendant officially released after 386BSD was forked. It continues to be actively developed and is a ...
and
FreeBSD
FreeBSD is a free and open-source Unix-like operating system descended from the Berkeley Software Distribution (BSD), which was based on Research Unix. The first version of FreeBSD was released in 1993. In 2005, FreeBSD was the most popular ...
(both in 1993), and
OpenBSD
OpenBSD is a security-focused, free and open-source, Unix-like operating system based on the Berkeley Software Distribution (BSD). Theo de Raadt created OpenBSD in 1995 by forking NetBSD 1.0. According to the website, the OpenBSD project em ...
(from NetBSD in 1995).
macOS
macOS (formerly "Mac OS X" and later "OS X") is a line of
open core graphical operating systems developed, marketed, and sold by
Apple Inc., the latest of which is pre-loaded on all currently shipping
Macintosh computers. macOS is the successor to the original
classic Mac OS
Mac OS (originally System Software; retronym: Classic Mac OS) is the series of operating systems developed for the Macintosh family of personal computers by Apple Computer from 1984 to 2001, starting with System 1 and ending with Mac OS 9. The ...
, which had been Apple's primary operating system since 1984. Unlike its predecessor, macOS is a
UNIX operating system built on technology that had been developed at
NeXT through the second half of the 1980s and up until Apple purchased the company in early 1997.
The operating system was first released in 1999 as
Mac OS X Server 1.0
Mac OS X Server 1.0 is an operating system developed by Apple Computer, Inc. Released on March 16, 1999, it was the first version of Mac OS X Server.
It was Apple's first commercial product to be derived from "Rhapsody"—an eventual replacemen ...
, followed in March 2001 by a client version (
Mac OS X v10.0 "Cheetah"). Since then, six more distinct "client" and "
server" editions of macOS have been released, until the two were merged in
OS X 10.7 "Lion".
Prior to its merging with macOS, the server edition
macOS Server was
architecturally identical to its desktop counterpart and usually ran on Apple's line of Macintosh
server hardware. macOS Server included work group management and administration software tools that provide simplified access to key
network service
In computer networking, a network service is an application running at the network application layer and above, that provides data storage, manipulation, presentation, communication or other capability which is often implemented using a client� ...
s, including a
mail transfer agent, a
Samba server, an
LDAP server, a
domain name server, and others. With
Mac OS X v10.7 Lion, all server aspects of Mac OS X Server have been integrated into the client version and the product re-branded as "OS X" (dropping "Mac" from the name). The server tools are now offered as an application.
z/OS UNIX System Services
First introduced as the OpenEdition upgrade to
MVS/ESA System Product Version 4 Release 3, announced February 1993 with support for
POSIX and other standards.
[
][
] z/OS UNIX System Services is built on top of
MVS services and cannot run independently. While IBM initially introduced OpenEdition to satisfy
FIPS requirements, several z/OS component now require UNIX services, e.g., TCP/IP.
Linux
The Linux kernel originated in 1991, as a project of
Linus Torvalds, while a university student in Finland. He posted information about his project on a newsgroup for computer students and programmers, and received support and assistance from volunteers who succeeded in creating a complete and functional kernel.
Linux is
Unix-like, but was developed without any Unix code, unlike BSD and its variants. Because of its open license model, the
Linux kernel
The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel. It was originally authored in 1991 by Linus Torvalds for his i386-based PC, and it was soon adopted as the kernel for the GNU ope ...
code is available for study and modification, which resulted in its use on a wide range of computing machinery from supercomputers to smartwatches. Although estimates suggest that Linux is
used on only 2.81% of all "desktop" (or laptop) PCs,
it has been widely adopted for use in servers and embedded systems such as cell phones. Linux has superseded Unix on many platforms and is used on most supercomputers including the top 385.
Many of the same computers are also on
Green500 (but in different order), and Linux runs on the top 10. Linux is also commonly used on other small energy-efficient computers, such as
smartphones and
smartwatches. The Linux kernel is used in some popular distributions, such as
Red Hat
Red Hat, Inc. is an American software company that provides open source software products to enterprises. Founded in 1993, Red Hat has its corporate headquarters in Raleigh, North Carolina, with other offices worldwide.
Red Hat has become ass ...
,
Debian
Debian (), also known as Debian GNU/Linux, is a Linux distribution composed of free and open-source software, developed by the community-supported Debian Project, which was established by Ian Murdock on August 16, 1993. The first version of D ...
,
Ubuntu,
Linux Mint and
Google's
Android
Android may refer to:
Science and technology
* Android (robot), a humanoid robot or synthetic organism designed to imitate a human
* Android (operating system), Google's mobile operating system
** Bugdroid, a Google mascot sometimes referred to ...
,
ChromeOS, and
ChromiumOS.
Microsoft Windows
Microsoft Windows is a family of
proprietary operating systems designed by
Microsoft Corporation and primarily targeted to Intel architecture based computers, with an estimated 88.9 percent total usage share on Web connected computers.
The latest version is
Windows 11.
In 2011, Windows 7 overtook Windows XP as the most common version in use.
Microsoft Windows was first released in 1985, as an
operating environment running on top of
MS-DOS, which was the standard operating system shipped on most Intel architecture personal computers at the time. In 1995,
Windows 95 was released which only used MS-DOS as a bootstrap. For backwards compatibility, Win9x could run real-mode MS-DOS and 16-bit
Windows 3.x drivers.
Windows ME, released in 2000, was the last version in the Win9x family. Later versions have all been based on the
Windows NT kernel. Current client versions of Windows run on
IA-32,
x86-64 and
ARM microprocessors. In addition
Itanium is still supported in older server version
Windows Server 2008 R2. In the past, Windows NT supported additional architectures.
Server editions of Windows are widely used, however, Windows' usage on servers is not as widespread as on personal computers as Windows competes against Linux and BSD for server market share.
ReactOS
ReactOS is a free and open-source operating system for amd64/i686 personal computers intended to be binary-compatible with computer programs and device drivers made for Windows Server 2003 and later versions of Windows. ReactOS has been noted a ...
is a Windows-alternative operating system, which is being developed on the principles of Windows without using any of Microsoft's code.
Other
There have been many operating systems that were significant in their day but are no longer so, such as
AmigaOS;
OS/2 from IBM and Microsoft;
classic Mac OS
Mac OS (originally System Software; retronym: Classic Mac OS) is the series of operating systems developed for the Macintosh family of personal computers by Apple Computer from 1984 to 2001, starting with System 1 and ending with Mac OS 9. The ...
, the non-Unix precursor to Apple's macOS;
BeOS
BeOS is an operating system for personal computers first developed by Be Inc. in 1990. It was first written to run on BeBox hardware.
BeOS was positioned as a multimedia platform that could be used by a substantial population of desktop users a ...
;
XTS-300;
RISC OS;
MorphOS;
Haiku;
BareMetal and
FreeMint. Some are still used in niche markets and continue to be developed as minority platforms for enthusiast communities and specialist applications.
The
z/OS operating system for IBM
z/Architecture mainframe computers is still being used and developed, and
OpenVMS
OpenVMS, often referred to as just VMS, is a multi-user, multiprocessing and virtual memory-based operating system. It is designed to support time-sharing, batch processing, transaction processing and workstation applications. Customers using Ope ...
, formerly from
DEC, is still under active development by
VMS Software Inc. The
IBM i
IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS in ...
operating system for IBM
AS/400 and
IBM Power Systems midrange computers is also still being used and developed.
Yet other operating systems are used almost exclusively in academia, for operating systems education or to do research on operating system concepts. A typical example of a system that fulfills both roles is
MINIX, while for example
Singularity is used purely for research. Another example is the
Oberon System
The Oberon System is a modular, single-user, single-process, multitasking operating system written in the programming language Oberon. It was originally developed in the late 1980s at ETH Zurich. The Oberon System has an unconventional visual t ...
designed at
ETH Zürich by
Niklaus Wirth,
Jürg Gutknecht and a group of students at the former Computer Systems Institute in the 1980s. It was used mainly for research, teaching, and daily work in Wirth's group.
Other operating systems have failed to win significant market share, but have introduced innovations that have influenced mainstream operating systems, not least Bell Labs'
Plan 9 Plan 9 or Plan Nine may refer to:
Music
* Plan 9 (band), a psychedelic rock band from Rhode Island
* ''Plan 9'', an album by Big Guitars From Memphis with Rick Lindy
* "Plan 9", a song on the 1993 album ''Gorgeous'' by electronica band 808 Stat ...
.
Components
The components of an operating system all exist in order to make the different parts of a computer work together. All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet component.
Kernel
With the aid of
firmware
In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
and
device driver
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabling operating systems and ot ...
s, the kernel provides the most basic level of control over all of the computer's hardware devices. It manages memory access for programs in the
RAM, it determines which programs get access to which hardware resources, it sets up or resets the CPU's operating states for optimal operation at all times, and it organizes the data for long-term
non-volatile storage with
file system
In computing, file system or filesystem (often abbreviated to fs) is a method and data structure that the operating system uses to control how data is stored and retrieved. Without a file system, data placed in a storage medium would be one larg ...
s on such media as disks, tapes, flash memory, etc.
Program execution
The operating system provides an interface between an application program and the computer hardware, so that an application program can interact with the hardware only by obeying rules and procedures programmed into the operating system. The operating system is also a set of services which simplify development and execution of application programs. Executing an application program typically involves the creation of a
process by the operating system
kernel, which assigns memory space and other resources, establishes a priority for the process in multi-tasking systems, loads program binary code into memory, and initiates execution of the application program, which then interacts with the user and with hardware devices. However, in some systems an application can request that the operating system execute another application within the same process, either as a subroutine or in a separate thread, e.g., the LINK and ATTACH facilities of
OS/360 and successors..
Interrupts
An
interrupt (also known as
abort,
exception, ''fault'',
signal and ''trap'')
provides an efficient way for most operating systems to react to the environment. Interrupts cause the
central processing unit (CPU) to have a
control flow change away from the currently running program to an
interrupt handler, also known as an interrupt service routine (ISR).
An interrupt service routine may cause the
central processing unit (CPU) to have a
context switch
In computing, a context switch is the process of storing the state of a process or thread, so that it can be restored and resume execution at a later point, and then restoring a different, previously saved, state. This allows multiple processes ...
. The details of how a computer processes an interrupt vary from architecture to architecture, and the details of how interrupt service routines behave vary from operating system to operating system.
However, several interrupt functions are common.
The architecture and operating system must:
# transfer control to an interrupt service routine.
# save the state of the currently running process.
# restore the state after the interrupt is serviced.
=Software interrupt
=
A software interrupt is a message to a
process that an event has occurred.
This contrasts with a ''hardware interrupt'' — which is a message to the
central processing unit (CPU) that an event has occurred.
Software interrupts are similar to hardware interrupts — there is a change away from the currently running process.
Similarly, both hardware and software interrupts execute an
interrupt service routine.
Software interrupts may be normally occurring events. It is expected that a
time slice will occur, so the kernel will have to perform a
context switch
In computing, a context switch is the process of storing the state of a process or thread, so that it can be restored and resume execution at a later point, and then restoring a different, previously saved, state. This allows multiple processes ...
.
A
computer program may set a timer to go off after a few seconds in case too much data causes an algorithm to take too long.
Software interrupts may be error conditions, such as a malformed
machine instruction.
However, the most common error conditions are
division by zero and
accessing an invalid memory address.
Users can send messages to the kernel to modify the behavior of a currently running process.
For example, in the
command-line environment, pressing the ''interrupt character'' (usually
Control-C) might terminate the currently running process.
To generate ''software interrupts'' for
x86 CPUs, the
INT assembly language
In computer programming, assembly language (or assembler language, or symbolic machine code), often referred to simply as Assembly and commonly abbreviated as ASM or asm, is any low-level programming language with a very strong correspondence be ...
instruction is available.
[
] The syntax is
INT X
, where
X
is the offset number (in
hexadecimal
In mathematics and computing, the hexadecimal (also base-16 or simply hex) numeral system is a positional numeral system that represents numbers using a radix (base) of 16. Unlike the decimal system representing numbers using 10 symbols, hexa ...
format) to the
interrupt vector table.
=Signal
=
To generate ''software interrupts'' in
Unix-like operating systems, the
kill(pid,signum)
system call will send a
signal to another process.
pid
is the
process identifier of the receiving process.
signum
is the signal number (in
mnemonic format) to be sent. (The abrasive name of
kill
was chosen because early implementations only terminated the process.)
In Unix-like operating systems, ''signals'' inform processes of the occurrence of asynchronous events.
To communicate asynchronously, interrupts are required.
One reason a process needs to asynchronously communicate to another process solves a variation of the classic
reader/writer problem.
The writer receives a pipe from the
shell for its output to be sent to the reader's input stream.
The
command-line syntax is
alpha , bravo
.
alpha
will write to the pipe when its computation is ready and then sleep in the wait queue.
bravo
will then be moved to the
ready queue and soon will read from its input stream.
The kernel will generate ''software interrupts'' to coordinate the piping.
''Signals'' may be classified into 7 categories.
The categories are:
# when a process finishes normally.
# when a process has an error exception.
# when a process runs out of a system resource.
# when a process executes an illegal instruction.
# when a process sets an alarm event.
# when a process is aborted from the keyboard.
# when a process has a tracing alert for debugging.
=Hardware interrupt
=
Input/Output (I/O)
devices are slower than the CPU. Therefore, it would slow down the computer if the CPU had to
wait
Wait or WAIT may refer to:
Music
* Wait (musician), British town pipers
Albums and EPs
* ''Wait'' (The Polyphonic Spree EP), by The Polyphonic Spree
* ''Wait'' (Emanuel Nice EP), a 2002 EP released by the band Emanuel Nice
* ''Wait'' (Stee ...
for each I/O to finish. Instead, a computer may implement interrupts for I/O completion, avoiding the need for
polling or busy waiting.
Some computers require an interrupt for each character or word, costing a significant amount of CPU time.
Direct memory access (DMA) is an architecture feature to allow devices to bypass the CPU and access
main memory
Computer data storage is a technology consisting of computer components and recording media that are used to retain digital data. It is a core function and fundamental component of computers.
The central processing unit (CPU) of a computer ...
directly.
[
] (Separate from the architecture, a device may perform direct memory access to and from main memory either directly or via a bus.)
[
]
Input/Output
=Interrupt-driven I/O
=
When a
computer user types a key on the keyboard, typically the character appears immediately on the screen. Likewise, when a user moves a
mouse
A mouse ( : mice) is a small rodent. Characteristically, mice are known to have a pointed snout, small rounded ears, a body-length scaly tail, and a high breeding rate. The best known mouse species is the common house mouse (''Mus musculus' ...
, the
cursor immediately moves across the screen. Each keystroke and mouse movement generates an ''interrupt'' called ''Interrupt-driven I/O''. An interrupt-driven I/O occurs when a process causes an interrupt for every character
or word transmitted.
=Direct Memory Access
=
Devices such as
hard disk drives
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating hard disk platter, platters ...
,
solid state drives, and
magnetic tape
Magnetic tape is a medium for magnetic storage made of a thin, magnetizable coating on a long, narrow strip of plastic film. It was developed in Germany in 1928, based on the earlier magnetic wire recording from Denmark. Devices that use magne ...
drives can transfer data at a rate high enough that interrupting the CPU for every byte or word transferred, and having the CPU transfer the byte or word between the device and memory, would require too much CPU time. Data is, instead, transferred between the device and memory independently of the CPU by hardware such as a
channel or a
direct memory access controller; an interrupt is delivered only when all the data is transferred.
If a
computer program executes a
system call to perform a block I/O ''write'' operation, then the system call might execute the following instructions:
* Set the contents of the CPU's
registers (including the
program counter
The program counter (PC), commonly called the instruction pointer (IP) in Intel x86 and Itanium microprocessors, and sometimes called the instruction address register (IAR), the instruction counter, or just part of the instruction sequencer, is ...
) into the
process control block.
* Create an entry in the device-status table.
The operating system maintains this table to keep track of which processes are waiting for which devices. One field in the table is the
memory address of the process control block.
* Place all the characters to be sent to the device into a
memory buffer.
* Set the memory address of the memory buffer to a predetermined
device register.
* Set the buffer size (an integer) to another predetermined register.
* Execute the
machine instruction to begin the writing.
* Perform a
context switch
In computing, a context switch is the process of storing the state of a process or thread, so that it can be restored and resume execution at a later point, and then restoring a different, previously saved, state. This allows multiple processes ...
to the next process in the
ready queue.
While the writing takes place, the operating system will context switch to other processes as normal. When the device finishes writing, the device will ''interrupt'' the currently running process by ''asserting'' an
interrupt request. The device will also place an integer onto the data bus.
Upon accepting the interrupt request, the operating system will:
* Push the contents of the
program counter
The program counter (PC), commonly called the instruction pointer (IP) in Intel x86 and Itanium microprocessors, and sometimes called the instruction address register (IAR), the instruction counter, or just part of the instruction sequencer, is ...
(a register) followed by the
status register onto the
call stack.
* Push the contents of the other registers onto the call stack. (Alternatively, the contents of the registers may be placed in a system table.)
* Read the integer from the data bus. The integer is an offset to the
interrupt vector table. The vector table's instructions will then:
:* Access the device-status table.
:* Extract the process control block.
:* Perform a context switch back to the writing process.
When the writing process has its
time slice expired, the operating system will:
* Pop from the call stack the registers other than the status register and program counter.
* Pop from the call stack the status register.
* Pop from the call stack the address of the next instruction, and set it back into the program counter.
With the program counter now reset, the interrupted process will resume its time slice.
Modes
Modern computers support multiple modes of operation. CPUs with this capability offer at least two modes:
user mode and
supervisor mode. In general terms, supervisor mode operation allows unrestricted access to all machine resources, including all MPU instructions. User mode operation sets limits on instruction use and typically disallows direct access to machine resources. CPUs might have other modes similar to user mode as well, such as the virtual modes in order to emulate older processor types, such as 16-bit processors on a 32-bit one, or 32-bit processors on a
64-bit one.
At power-on or reset, the system begins in supervisor mode. Once an operating system
kernel has been loaded and started, the boundary between user mode and supervisor mode (also known as kernel mode) can be established.
Supervisor mode is used by the kernel for low level tasks that need unrestricted access to hardware, such as controlling how memory is accessed, and communicating with devices such as disk drives and video display devices. User mode, in contrast, is used for almost everything else. Application programs, such as word processors and database managers, operate within user mode, and can only access machine resources by turning control over to the kernel, a process which causes a switch to supervisor mode. Typically, the transfer of control to the kernel is achieved by executing a
software interrupt instruction, such as the Motorola 68000
TRAP
instruction. The software interrupt causes the processor to switch from user mode to supervisor mode and begin executing code that allows the kernel to take control.
In user mode, programs usually have access to a restricted set of processor instructions, and generally cannot execute any instructions that could potentially cause disruption to the system's operation. In supervisor mode, instruction execution restrictions are typically removed, allowing the kernel unrestricted access to all machine resources.
The term "user mode resource" generally refers to one or more CPU registers, which contain information that the running program isn't allowed to alter. Attempts to alter these resources generally cause a switch to supervisor mode, where the operating system can deal with the illegal operation the program was attempting; for example, by forcibly terminating ("killing") the program.
Memory management
Among other things, a multiprogramming operating system
kernel must be responsible for managing all system memory which is currently in use by the programs. This ensures that a program does not interfere with memory already in use by another program. Since programs time share, each program must have independent access to memory.
Cooperative memory management, used by many early operating systems, assumes that all programs make voluntary use of the
kernel's memory manager, and do not exceed their allocated memory. This system of memory management is almost never seen any more, since programs often contain bugs which can cause them to exceed their allocated memory. If a program fails, it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs or viruses may purposefully alter another program's memory, or may affect the operation of the operating system itself. With cooperative memory management, it takes only one misbehaved program to crash the system.
Memory protection enables the
kernel to limit a process' access to the computer's memory. Various methods of memory protection exist, including
memory segmentation and
paging. All methods require some level of hardware support (such as the
80286 MMU), which doesn't exist in all computers.
In both segmentation and paging, certain
protected mode
In computing, protected mode, also called protected virtual address mode, is an operational mode of x86-compatible central processing units (CPUs). It allows system software to use features such as virtual memory, paging and safe multi-tasking d ...
registers specify to the CPU what memory address it should allow a running program to access. Attempts to access other addresses trigger an interrupt, which causes the CPU to re-enter
supervisor mode, placing the
kernel in charge. This is called a
segmentation violation or Seg-V for short, and since it is both difficult to assign a meaningful result to such an operation, and because it is usually a sign of a misbehaving program, the
kernel generally resorts to terminating the offending program, and reports the error.
Windows versions 3.1 through ME had some level of memory protection, but programs could easily circumvent the need to use it. A
general protection fault would be produced, indicating a segmentation violation had occurred; however, the system would often crash anyway.
Virtual memory
The use of virtual memory addressing (such as paging or segmentation) means that the kernel can choose what memory each program may use at any given time, allowing the operating system to use the same memory locations for multiple tasks.
If a program tries to access memory that isn't in its current range of accessible memory, but nonetheless has been allocated to it, the kernel is interrupted in the same way as it would if the program were to exceed its allocated memory. (See section on memory management.) Under UNIX this kind of interrupt is referred to as a
page fault.
When the kernel detects a page fault it generally adjusts the virtual memory range of the program which triggered it, granting it access to the memory requested. This gives the kernel discretionary power over where a particular application's memory is stored, or even whether or not it has actually been allocated yet.
In modern operating systems, memory which is accessed less frequently can be temporarily stored on a disk or other media to make that space available for use by other programs. This is called
swapping, as an area of memory can be used by multiple programs, and what that memory area contains can be swapped or exchanged on demand.
"Virtual memory" provides the programmer or the user with the perception that there is a much larger amount of RAM in the computer than is really there.
Multitasking
Multitasking refers to the running of multiple independent computer programs on the same computer, giving the appearance that it is performing the tasks at the same time. Since most computers can do at most one or two things at one time, this is generally done via time-sharing, which means that each program uses a share of the computer's time to execute.
An operating system
kernel contains a
scheduling program which determines how much time each process spends executing, and in which order execution control should be passed to programs. Control is passed to a process by the kernel, which allows the program access to the
CPU
A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and ...
and memory. Later, control is returned to the kernel through some mechanism, so that another program may be allowed to use the CPU. This so-called passing of control between the kernel and applications is called a
context switch
In computing, a context switch is the process of storing the state of a process or thread, so that it can be restored and resume execution at a later point, and then restoring a different, previously saved, state. This allows multiple processes ...
.
An early model which governed the allocation of time to programs was called
cooperative multitasking. In this model, when control is passed to a program by the kernel, it may execute for as long as it wants before explicitly returning control to the kernel. This means that a malicious or malfunctioning program may not only prevent any other programs from using the CPU, but it can hang the entire system if it enters an
infinite loop.
Modern operating systems extend the concepts of application preemption to device drivers and kernel code, so that the operating system has preemptive control over internal run-times as well.
The philosophy governing
preemptive multitasking is that of ensuring that all programs are given regular time on the CPU. This implies that all programs must be limited in how much time they are allowed to spend on the CPU without being interrupted. To accomplish this, modern operating system kernels make use of a timed interrupt. A
protected mode
In computing, protected mode, also called protected virtual address mode, is an operational mode of x86-compatible central processing units (CPUs). It allows system software to use features such as virtual memory, paging and safe multi-tasking d ...
timer is set by the kernel which triggers a return to supervisor mode after the specified time has elapsed. (See above sections on Interrupts and Dual Mode Operation.)
On many single user operating systems cooperative multitasking is perfectly adequate, as home computers generally run a small number of well tested programs.
AmigaOS is an exception, having preemptive multitasking from its first version.
Windows NT was the first version of
Microsoft Windows
Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
which enforced preemptive multitasking, but it didn't reach the home user market until
Windows XP (since
Windows NT was targeted at professionals).
Disk access and file systems
Access to data stored on disks is a central feature of all operating systems. Computers store data on
disks using
files
File or filing may refer to:
Mechanical tools and processes
* File (tool), a tool used to ''remove'' fine amounts of material from a workpiece
**Filing (metalworking), a material removal process in manufacturing
** Nail file, a tool used to gent ...
, which are structured in specific ways in order to allow for faster access, higher reliability, and to make better use of the drive's available space. The specific way in which files are stored on a disk is called a
file system
In computing, file system or filesystem (often abbreviated to fs) is a method and data structure that the operating system uses to control how data is stored and retrieved. Without a file system, data placed in a storage medium would be one larg ...
, and enables files to have names and attributes. It also allows them to be stored in a hierarchy of directories or folders arranged in a
directory tree.
Early operating systems generally supported a single type of disk drive and only one kind of file system. Early file systems were limited in their capacity, speed, and in the kinds of file names and directory structures they could use. These limitations often reflected limitations in the operating systems they were designed for, making it very difficult for an operating system to support more than one file system.
While many simpler operating systems support a limited range of options for accessing storage systems, operating systems like
UNIX and
Linux support a technology known as a
virtual file system or VFS. An operating system such as UNIX supports a wide array of storage devices, regardless of their design or
file system
In computing, file system or filesystem (often abbreviated to fs) is a method and data structure that the operating system uses to control how data is stored and retrieved. Without a file system, data placed in a storage medium would be one larg ...
s, allowing them to be accessed through a common
application programming interface
An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software interface, offering a service to other pieces of software. A document or standard that describes how t ...
(API). This makes it unnecessary for programs to have any knowledge about the device they are accessing. A VFS allows the operating system to provide programs with access to an unlimited number of devices with an infinite variety of file systems installed on them, through the use of specific
device driver
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabling operating systems and ot ...
s and file system drivers.
A connected
storage device, such as a
hard drive, is accessed through a
device driver
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabling operating systems and ot ...
. The device driver understands the specific language of the drive and is able to translate that language into a standard language used by the operating system to access all disk drives. On UNIX, this is the language of
block devices.
When the kernel has an appropriate device driver in place, it can then access the contents of the disk drive in raw format, which may contain one or more file systems. A file system driver is used to translate the commands used to access each specific file system into a standard set of commands that the operating system can use to talk to all file systems. Programs can then deal with these file systems on the basis of filenames, and directories/folders, contained within a hierarchical structure. They can create, delete, open, and close files, as well as gather various information about them, including access permissions, size, free space, and creation and modification dates.
Various differences between file systems make supporting all file systems difficult. Allowed characters in file names,
case sensitivity, and the presence of various kinds of
file attributes makes the implementation of a single interface for every file system a daunting task. Operating systems tend to recommend using (and so support natively) file systems specifically designed for them; for example,
NTFS in Windows and
ReiserFS,
Reiser4,
ext3,
ext4 and
Btrfs in Linux. However, in practice, third party drivers are usually available to give support for the most widely used file systems in most general-purpose operating systems (for example, NTFS is available in Linux through
NTFS-3g, and ext2/3 and ReiserFS are available in Windows through third-party software).
Support for file systems is highly varied among modern operating systems, although there are several common file systems which almost all operating systems include support and drivers for. Operating systems vary on file system support and on the disk formats they may be installed on. Under Windows, each file system is usually limited in application to certain media; for example, CDs must use
ISO 9660 or
UDF, and as of
Windows Vista, NTFS is the only file system which the operating system can be installed on. It is possible to install Linux onto many types of file systems. Unlike other operating systems, Linux and UNIX allow any file system to be used regardless of the media it is stored in, whether it is a hard drive, a disc (
CD,
DVD...), a USB flash drive, or even contained within a file located on another file system.
Device drivers
A
device driver
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabling operating systems and ot ...
is a specific type of computer software developed to allow interaction with hardware devices. Typically this constitutes an interface for communicating with the device, through the specific computer bus or communications subsystem that the hardware is connected to, providing commands to and/or receiving data from the device, and on the other end, the requisite interfaces to the operating system and software applications. It is a specialized hardware-dependent computer program which is also operating system specific that enables another program, typically an operating system or applications software package or computer program running under the operating system kernel, to interact transparently with a hardware device, and usually provides the requisite interrupt handling necessary for any necessary asynchronous time-dependent hardware interfacing needs.
The key design goal of device drivers is
abstraction. Every model of hardware (even within the same class of device) is different. Newer models also are released by manufacturers that provide more reliable or better performance and these newer models are often controlled differently. Computers and their operating systems cannot be expected to know how to control every device, both now and in the future. To solve this problem, operating systems essentially dictate how every type of device should be controlled. The function of the device driver is then to translate these operating system mandated function calls into device specific calls. In theory a new device, which is controlled in a new manner, should function correctly if a suitable driver is available. This new driver ensures that the device appears to operate as usual from the operating system's point of view.
Under versions of Windows before Vista and versions of Linux before 2.6, all driver execution was co-operative, meaning that if a driver entered an infinite loop it would freeze the system. More recent revisions of these operating systems incorporate kernel preemption, where the kernel interrupts the driver to give it tasks, and then separates itself from the process until it receives a response from the device driver, or gives it more tasks to do.
Networking
Currently most operating systems support a variety of networking protocols, hardware, and applications for using them. This means that computers running dissimilar operating systems can participate in a common
network for sharing resources such as
computing, files, printers, and scanners using either wired or wireless connections. Networks can essentially allow a computer's operating system to access the resources of a remote computer to support the same functions as it could if those resources were connected directly to the local computer. This includes everything from simple communication, to using networked file systems or even sharing another computer's graphics or sound hardware. Some network services allow the resources of a computer to be accessed transparently, such as
SSH which allows networked users direct access to a computer's command line interface.
Client/server networking allows a program on a computer, called a client, to connect via a network to another computer, called a server. Servers offer (or host) various services to other network computers and users. These services are usually provided through ports or numbered access points beyond the server's
IP address. Each port number is usually associated with a maximum of one running program, which is responsible for handling requests to that port. A daemon, being a user program, can in turn access the local hardware resources of that computer by passing requests to the operating system kernel.
Many operating systems support one or more vendor-specific or open networking protocols as well, for example,
SNA
SNA or Sna may refer to:
Organizations
* Novinite.com (Sofia News Agency), Bulgaria's largest English-language news provider
* Shanni Nationalities Army
* Singapore National Academy, a school in Surabaya, Indonesia
* Sky News Australia, an Austra ...
on
IBM systems,
DECnet on systems from
Digital Equipment Corporation, and Microsoft-specific protocols (
SMB) on Windows. Specific protocols for specific tasks may also be supported such as
NFS for file access. Protocols like
ESound
In computing, the Enlightened Sound Daemon (ESD or EsounD) was the sound server for Enlightenment and GNOME. Esound is a small sound daemon for both Linux and UNIX. ESD was created to provide a consistent and simple interface to the audio devi ...
, or esd can be easily extended over the network to provide sound from local applications, on a remote system's sound hardware.
Security
A computer being secure depends on a number of technologies working properly. A modern operating system provides access to a number of resources, which are available to software running on the system, and to external devices like networks via the kernel.
The operating system must be capable of distinguishing between requests which should be allowed to be processed, and others which should not be processed. While some systems may simply distinguish between "privileged" and "non-privileged", systems commonly have a form of requester ''identity'', such as a user name. To establish identity there may be a process of ''authentication''. Often a username must be quoted, and each username may have a password. Other methods of authentication, such as magnetic cards or biometric data, might be used instead. In some cases, especially connections from the network, resources may be accessed with no authentication at all (such as reading files over a network share). Also covered by the concept of requester identity is ''authorization''; the particular services and resources accessible by the requester once logged into a system are tied to either the requester's user account or to the variously configured groups of users to which the requester belongs.
In addition to the allow or disallow model of security, a system with a high level of security also offers auditing options. These would allow tracking of requests for access to resources (such as, "who has been reading this file?"). Internal security, or security from an already running program is only possible if all possibly harmful requests must be carried out through interrupts to the operating system kernel. If programs can directly access hardware and resources, they cannot be secured.
External security involves a request from outside the computer, such as a login at a connected console or some kind of network connection. External requests are often passed through device drivers to the operating system's kernel, where they can be passed onto applications, or carried out directly. Security of operating systems has long been a concern because of highly sensitive data held on computers, both of a commercial and military nature. The United States
Government Department of Defense (DoD) created the ''
Trusted Computer System Evaluation Criteria'' (TCSEC) which is a standard that sets basic requirements for assessing the effectiveness of security. This became of vital importance to operating system makers, because the TCSEC was used to evaluate, classify and select
trusted operating systems being considered for the processing, storage and retrieval of sensitive or
classified information.
Network services include offerings such as file sharing, print services, email, web sites, and
file transfer protocols (FTP), most of which can have compromised security. At the front line of security are hardware devices known as
firewalls or intrusion detection/prevention systems. At the operating system level, there are a number of software firewalls available, as well as intrusion detection/prevention systems. Most modern operating systems include a software firewall, which is enabled by default. A software firewall can be configured to allow or deny network traffic to or from a service or application running on the operating system. Therefore, one can install and be running an insecure service, such as Telnet or FTP, and not have to be threatened by a security breach because the firewall would deny all traffic trying to connect to the service on that port.
An alternative strategy, and the only
sandbox
A sandbox is a sandpit, a wide, shallow playground construction to hold sand, often made of wood or plastic.
Sandbox or Sand box may also refer to:
Arts, entertainment, and media
* Sandbox (band), a Canadian rock music group
* Sandbox ( ...
strategy available in systems that do not meet the
Popek and Goldberg virtualization requirements, is where the operating system is not running user programs as native code, but instead either
emulates a processor or provides a host for a
p-code
Bytecode (also called portable code or p-code) is a form of instruction set designed for efficient execution by a software interpreter. Unlike human-readable source code, bytecodes are compact numeric codes, constants, and references (normal ...
based system such as Java.
Internal security is especially relevant for multi-user systems; it allows each user of the system to have private files that the other users cannot tamper with or read. Internal security is also vital if auditing is to be of any use, since a program can potentially bypass the operating system, inclusive of bypassing auditing.
User interface
Every computer that is to be operated by an individual requires a
user interface. The user interface is usually referred to as a
shell and is essential if human interaction is to be supported. The user interface views the
directory structure and requests services from the operating system that will acquire data from
input hardware devices, such as a
keyboard,
mouse
A mouse ( : mice) is a small rodent. Characteristically, mice are known to have a pointed snout, small rounded ears, a body-length scaly tail, and a high breeding rate. The best known mouse species is the common house mouse (''Mus musculus' ...
or
credit card reader, and requests operating system services to display
prompts,
status message
A status message is a function of some instant messaging applications whereby a user may post a message that appears automatically to other users if they attempt to make contact. A status message can tell other contacts the user's current status, ...
s and such on
output hardware devices, such as a
video monitor or
printer. The two most common forms of a user interface have historically been the
command-line interface
A command-line interpreter or command-line processor uses a command-line interface (CLI) to receive commands from a user in the form of lines of text. This provides a means of setting parameters for the environment, invoking executables and pro ...
, where computer commands are typed out line-by-line, and the
graphical user interface, where a visual environment (most commonly a
WIMP
Wimp, WIMP, or Wimps may refer to:
Science and technology
* Weakly interacting massive particle, a hypothetical particle of dark matter
* WIMP (computing), the "window, icon, menu, pointer" paradigm
* WIMP (software bundle), the web stack of Win ...
) is present.
Graphical user interfaces
Most of the modern computer systems support
graphical user interfaces (GUI), and often include them. In some computer systems, such as the original implementation of the
classic Mac OS
Mac OS (originally System Software; retronym: Classic Mac OS) is the series of operating systems developed for the Macintosh family of personal computers by Apple Computer from 1984 to 2001, starting with System 1 and ending with Mac OS 9. The ...
, the GUI is integrated into the
kernel.
While technically a graphical user interface is not an operating system service, incorporating support for one into the operating system kernel can allow the GUI to be more responsive by reducing the number of
context switch
In computing, a context switch is the process of storing the state of a process or thread, so that it can be restored and resume execution at a later point, and then restoring a different, previously saved, state. This allows multiple processes ...
es required for the GUI to perform its output functions. Other operating systems are
modular, separating the graphics subsystem from the kernel and the Operating System. In the 1980s UNIX, VMS and many others had operating systems that were built this way. Linux and macOS are also built this way. Modern releases of Microsoft Windows such as
Windows Vista implement a graphics subsystem that is mostly in user-space; however the graphics drawing routines of versions between
Windows NT 4.0 and
Windows Server 2003 exist mostly in kernel space.
Windows 9x had very little distinction between the interface and the kernel.
Many computer operating systems allow the user to install or create any user interface they desire. The
X Window System in conjunction with
GNOME
A gnome is a mythological creature and diminutive spirit in Renaissance magic and alchemy, first introduced by Paracelsus in the 16th century and later adopted by more recent authors including those of modern fantasy literature. Its characte ...
or
KDE Plasma 5 is a commonly found setup on most Unix and
Unix-like (BSD, Linux, Solaris) systems. A number of
Windows shell replacements have been released for Microsoft Windows, which offer alternatives to the included
Windows shell, but the shell itself cannot be separated from Windows.
Numerous Unix-based GUIs have existed over time, most derived from X11. Competition among the various vendors of Unix (HP, IBM, Sun) led to much fragmentation, though an effort to standardize in the 1990s to
COSE and
CDE CDE may refer to:
Education
* California Department of Education
* Career Development Event, a type of contest sponsored by the National FFA Organization
* Center for Data Engineering, IIIT Hyderabad
* Center for Distance Education at University of ...
failed for various reasons, and were eventually eclipsed by the widespread adoption of GNOME and
K Desktop Environment
The KDE Software Compilation (KDE SC) was an umbrella term for the desktop environment plus a range of included applications produced by KDE. From its 1.0 release in July 1998 until the release of version 4.4 in February 2010, the Software Compi ...
. Prior to
free software-based toolkits and desktop environments, Motif was the prevalent toolkit/desktop combination (and was the basis upon which CDE was developed).
Graphical user interfaces evolve over time. For example, Windows has modified its user interface almost every time a new major version of Windows is released, and the Mac OS GUI changed dramatically with the introduction of Mac OS X in 1999.
[Poisson, Ken]
"Chronology of Personal Computer Software"
. Retrieved on 2008-05-07. Last checked on 2009-03-30.
Real-time operating systems
A real-time operating system (RTOS) is an operating system intended for applications with fixed deadlines (
real-time computing). Such applications include some small
embedded systems, automobile engine controllers, industrial robots, spacecraft, industrial control, and some large-scale computing systems.
An early example of a large-scale real-time operating system was
Transaction Processing Facility developed by
American Airlines and
IBM for the
Sabre Airline Reservations System.
Embedded systems that have fixed deadlines use a
real-time operating system such as
VxWorks,
PikeOS,
eCos,
QNX,
MontaVista Linux and
RTLinux.
Windows CE is a
real-time operating system that shares similar APIs to desktop Windows but shares none of desktop Windows' codebase.
Symbian OS also has an RTOS kernel (EKA2) starting with version 8.0b.
Some embedded systems use operating systems such as
Palm OS,
BSD, and
Linux, although such operating systems do not support real-time computing.
Operating system development as a hobby
A hobby operating system may be classified as one whose code has not been directly derived from an existing operating system, and has few users and active developers.
In some cases, hobby development is in support of a "
homebrew
Homebrewing mainly refers to small-scale, non-commercial manufacture of a drink, typically beer.
Homebrew or home brew may also refer to:
Computing
* Homebrew Computer Club
* Homebrew (package manager), for macOS and Linux
* Homebrew (video game ...
" computing device, for example, a simple
single-board computer
A single-board computer (SBC) is a complete computer built on a single circuit board, with microprocessor(s), memory, input/output (I/O) and other features required of a functional computer. Single-board computers are commonly made as demonstrati ...
powered by a
6502 microprocessor. Or, development may be for an architecture already in widespread use. Operating system development may come from entirely new concepts, or may commence by modeling an existing operating system. In either case, the hobbyist is her/his own developer, or may interact with a small and sometimes unstructured group of individuals who have like interests.
Examples of a hobby operating system include
Syllable
A syllable is a unit of organization for a sequence of speech sounds typically made up of a syllable nucleus (most often a vowel) with optional initial and final margins (typically, consonants). Syllables are often considered the phonological "bu ...
and
TempleOS.
Diversity of operating systems and portability
Application software is generally written for use on a specific operating system, and sometimes even for specific hardware. When porting the application to run on another OS, the functionality required by that application may be implemented differently by that OS (the names of functions, meaning of arguments, etc.) requiring the application to be adapted, changed, or otherwise
maintained.
Unix was the first operating system not written in assembly language, making it very
portable to systems different from its native
PDP-11
The PDP-11 is a series of 16-bit minicomputers sold by Digital Equipment Corporation (DEC) from 1970 into the 1990s, one of a set of products in the Programmed Data Processor (PDP) series. In total, around 600,000 PDP-11s of all models were sold, ...
.
This cost in supporting operating systems diversity can be avoided by instead writing applications against
software platforms such as
Java or
Qt. These abstractions have already borne the cost of adaptation to specific operating systems and their
system libraries.
Another approach is for operating system vendors to adopt standards. For example,
POSIX and
OS abstraction layers provide commonalities that reduce porting costs.
Market share
See also
*
Comparison of operating systems
*
Crash (computing)
*
Hypervisor
*
Interruptible operating system
An interruptible operating system is an operating system with ability to handle multiple interrupts concurrently, or in other words, which allow interrupts to be interrupted.
Concurrent interrupt handling essentially mean concurrent execution of ...
*
List of important publications in operating systems
*
List of operating systems
* List of pioneers in computer science
* Live CD
* Glossary of operating systems terms
* Microcontroller
* Mobile device
* Mobile operating system
* Network operating system
* Object-oriented operating system
* Operating System Projects
* System Commander
* System image
* Timeline of operating systems
Notes
References
Further reading
*
*
*
*
*
* O'Brien, J. A., & Marakas, G. M.(2011). ''Management Information Systems''. 10e. McGraw-Hill Irwin.
*
*
External links
*
Multics Historyand the history of operating systems
{{Authority control
Operating systems,