Thursday, 10 February 2011

Expected layer structure of windows 8

Will windows 8 structure consist of same layers as that of windows 7?


Expected layer structure of windows 8As we know that operating system is the complex set of softwares and programs which organized the large entity sets into units for the easier accessing of the particular set of data, the design and structure of the operating system is implemented as the sequential hierarchical structure for files accessing such that the address of the software locations are referred by the reference variables and this approach of referring the different variables in partitions is known as modular approach in which the addresses of the certain memory locations are divided into modules for the completion of the tasks such that each task will consist of algorithms and data structure for the dependent and independent resources which also consist of primitive object for their operation. Moreover, the hierarchical file system in the windows 7 will consist of the layers which manage the management operations defined in the specified structure and now the question arises “will windows 8 consist of same set of layers as used in previous windows versions?” If yes, then define the expected number of layers that will be there in the windows 8 and their functionality.

Expected layer structure of windows 8


According to the estimations, the hierarchical file organization is there in windows 8 which will consist of so many layers and each layer will consist of some set of functionality for the system management operations, the programmers and operating system designers uses the common design approach for the windows 8 which will be explained as follows-

Layer number 1


It is the very first layer in the windows 8 operating system which is basically meant for the management of the hardware and peripheral devices that track and monitor the various incoming and outgoing states of the processes. Instead of this, for suspended and swapped processes a separate queue is maintained in the separate memory locations .This memory locations are also consist of the communicable list for the communication that manages the interrupts for the working of any hardware and peripheral device, the structure of the various process management task is take place in this layer such that creation, suspension, blocking, resuming, execution etc and due to this fact only that it is often known as the kernel and nucleus of operating system.

Layer number 2


It is the layer which is used for the management of the secondary memory that allows the principle of virtual memory in which the softwares or programs are executed only if the space in the main memory is more for process allocation. If we have less main memory space then it loads the same part of program in the secondary disk for software execution and this loading of the program from main memory to secondary memory is known as Virtual memory concept, the data which is there in the secondary drive can be read by the layer 2 and then also provides the writing function. Moreover, the layer number 2 will provide the interface to the layer 3 for its operation.

Layer Number 3


The main memory management operations that includes the execution of only those processes which consist of the sufficient memory space in main memory, the other programs which requires the larger memory space will be not be allocated in the main memory and transfer to the waiting register, these all waited or suspended processes will have to wait for their execution when the memory will free itself from other processes. Moreover, the protection and data sharing tasks can be executed by this layer with the data fetching ability from main memory with the paging and segmentation technique that partitions the main memory into physical and logical processes.

Layer number 4


This layer number 4 will consist of the storage settings that can be implemented as the main medium for data manipulation that provides the sophisticated way of space allocation in the secondary memory that removes the errors that may occurs in the data copying when the data can be stored in the secondary drive from any external source, it also act as the intermediater between the between the CPU and I/O devices that can either use the character oriented approach or block oriented approach for the storage purpose.

Layer number 5


It is the windows Power shell which is known as command line interpreter for the user and operating system which interface their personal approaches, whenever the user make use of any service then the layer number 5 automatically interprets that service request and after identification of the service, it provides the confirmation service to the user and then execute the request for maintaining the better environment for the file, process, device and I/O management, the details of the management operations can be hidden from the user and all the processing takes place in the backward areas and only the finalized results will be shown to the user.

No comments:

Post a Comment

what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...