Brief analysis on the principle of computer (II.)

Source: Internet
Author: User

1. System calls: System call, the kernel is used by the operating system to make the upper-level program use the underlying hardware.

2. Library (API): Between the kernel and the upper layer of the program, is a lot of direct calls to the underlying hardware software call interface collection, so the operating system in addition to provide kernel and system calls, but also need to output, this output is a higher-level interface output, this interface is called the library. The library itself is an application, but this kind of program does not have the execution entrance of the program, cannot run independently, can only be executed when other program calls. The execution environment in which the library exists is called. Call libraries are called Library calls, which are different from the kernel's system calls.

3. Any time the application is unable to access the kernel in the 0 zone

4. The memory is actually divided into 3 segments: the first paragraph is to give the BIOS power-on self-test; the second segment is mapped by the kernel 0, allowing the kernel to start normally; The third paragraph reads the general data.

5. Memory fragmentation is ubiquitous, the operating system can flexibly adjust memory to avoid fragmentation, indicating that the operating system is a very complex system

6.Shell is called the kernel, is a software that can accept and understand user instructions, and transfer information to the kernel, the kernel commands an application to launch an interface (interface), from a broad sense of two kinds: graphical user interface; command line interface.

7. Functions of the kernel:

Process Management

Memory management

File system

Network functions

Hardware Drivers

Security mechanisms

8. The original Linux was just a kernel, requiring gun's accompanying software, such as the glibc and GCC of the gun. Then by the Redhat, SLS, Debian, SuSE and other publishers packaging distribution to add their own understanding of the system and their respective logo. Manage the software of gun, Redhat Software Management tool RPM. In any case, as long as the binaries based on the Linux kernel are compiled, you must follow the GPL, which is to share all the source code.


This article is from "G-lab Guo Director" blog, please be sure to keep this source http://atomguo.blog.51cto.com/744135/1767582

Brief analysis on the principle of computer (II.)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.