1. 1 operating system overview 1
1. 1. 1 the concept of operating system 2
1. 1.2 target 2 of the operating system
1. 1.3 The role of the operating system 3
Research on 1. 1.4 Operating System
Several viewpoints 4
1.2 development history of operating system 5
1.2. 1 Promote the development of the operating system.
Power 5
1.2.2 Historical evolution of operating system 6
1.2.3 Main achievements of operating system 1 1
1.2.4 Modern operating system type 12
1.3 Features and functions of operating system 15
Functions of 1.3. 1 operating system 15
1.3.2 operating system functions 17
Overview of UNIX operating system 1.4 18
1.4. 1 UNIX history 18
The function of 1. 4. 2 Unix 19
1.4.3 UNIX architecture
1.4.4 UNIX user interface 20
Summary 2 1
Training 1 installing Windows 722
Training 2 Windows 7 System Management 23
Exercise 25 in this chapter
Chapter 2 Operating System Structure 27
2. 1 operating system services 27
2. 1. 1 user interface of operating system 28
2. 1.2 Program Interface of Operating System 29
2.2 Design and Implementation of Operating System 32
Design objective 32
Design process 32
2.2.3 The realization of the design 33
2.3 Overview of Operating System Structure 33
2.3. 1 computer system organization 33
Computer system architecture 34
2.3.3 General Operating System Architecture 35
Summary 38
Exercise 38 in this chapter
Chapter 3 Process Management Page 40
3. 1 Basic concept of process 40
3. 1. 1 process introduction 40
3. Definition and characteristics of1.2 Process 4 1
3. 1.3 process state and its transformation 42
3. 1.4 process composition 44
3. 1.5 process control block 45
3.2 Process Control 46
3.2. 1 process creation 47
3.2.2 Termination of Process 48
3.2.3 Process Blocking and Wake-up 48
3.2.4 Suspension and Activation of Process 49
3.3 Process Synchronization 49
Basic concepts of process synchronization 50
3.3.2 Process synchronization mechanism 5 1
The locking mechanism 52
3.4 Semaphore Mechanism 52
3.4. 1 signal mechanism definition 53
3.4.2 semaphore mechanism to achieve mutual exclusion 55
3.4.3 Semaphore Mechanism for Synchronization 56
3.4.4 Implementation of semaphore mechanism
Resource allocation 56
3.5 Using semaphore mechanism to solve the classic
Process synchronization problem 58
Producer-consumer problem 58
3.5.2 Reader-Author Questions 58
3.5.3 philosopher dining problem 59
*3.6 Tube side mechanism 60
3.6. 1 Basic concept of pipe pass 6 1
3.6.2 Solving the problem of "producer-
Consumer problem "6 1
3.7 Process Communication 62
3.7. 1 process communication type 63
3.7.2 Message communication 63
3.8 Thread 66
3.8. 1 Basic concepts of threads 67
3.8.2 Synchronization and communication between threads 68
3.8.3 Implementation of Threads 69
3.9 UNIX process management 70
UNIX process description 70
3.9.2 UNIX process state and its transition 7 1
UNIX process control 72
3.9.4 Synchronization and communication of UNIX processes 73
Summary 74
Training 3 Windows 7 Task Manager
Process management 75
Exercise 76 in this chapter
Chapter 4 Processor Scheduling and Deadlock 80
4. 1 Basic concept of processor scheduling 80
4. 1. 1 processor scheduling level 80
4. 1.2 scheduling queue model 8 1
4. 1.3 scheduling performance evaluation criteria 83
4.2 Operation Plan 84
4.2. 1 operational concept 84
4.2.2 Operation Status and Transition 85
Operation plan 86
4.2.4 Job Scheduling Algorithm 87
4.3 Process arrangement 90
4.3. 1 process scheduling function 90
4.3.2 Schedule of Process Scheduling 90
4.3.3 Process scheduling performance evaluation 9 1
4.3.4 process scheduling algorithm 9 1
4.4 Deadlock 95
4.4. 1 deadlock reason 95
4.4.2 Necessary conditions for deadlock 96
4.4.3 Basic methods of deadlock handling 96
Prevent deadlock 97
4.5 Resource Allocation Diagram and Deadlock Theorem 98
Resource allocation chart 98
4.5.2 Deadlock Theorem 98
4.6 Avoiding Deadlock 99
4.6. 1 system resource allocation status 100
4.6.2 Bankers with Single Resources
Algorithm 100
4.6.3 Bankers with multiple resources
Algorithm 102
4.7 Deadlock Detection and Recovery 103
4.7. 1 deadlock detection opportunity 104
4.7.2 Deadlock Detection Method 104
4.7.3 Deadlock Elimination 105
4.7.4 Comprehensive method to deal with deadlock 106
4.8 UNIX process scheduling 106
Summary 108
Exercise in this chapter 108
Chapter 5 Memory Management 1 1 1
5. 1 Overview of memory management11/
5. 1. 1 memory hierarchy 1 12
5. 1.2 Purpose of storage management 1 12
5. 1.3 storage management function 1 12
5.2 Partition Storage Management 1 15
5.2. 1 Single continuous partition storage
Management 1 15
5.2.2 Fixed partition storage management 1 17
5.2.3 Variable partition storage management 1 19
5.3 Paged Storage Management 125
5.3. 1 paging storage management
Basic ideas 125
5.3.2 Address Translation and Storage Protection 127
5.3.3 Organization and management of memory blocks 130
Paged storage management
Features and disadvantages 13 1
5.4 segmented storage management 132
5.4. 1 segmented storage management mode
Introduction 132
5.4.2 Segmented storage management
Basic ideas 133
* * * Enjoy 134 in clause 5.4.3.
5.4.4 Comparison between Pagination and Segmentation 134
5.4.5 Page-by-page storage management mode 135
5.5 The concept of virtual memory 136
5.5. 1 introducing virtual memory 137
5.5.2 Implementation of Virtual Memory 138
5.6 Request Paged Storage Management 139
5.6. 1 Request paging storage management
Basic ideas 139
5.6.2 Page Missing Interrupt and Address Translation 140
5.6.3 Page Elimination Algorithm 142
5.6.4 Request paging storage management
Advantages and disadvantages 146
5.7 Request segmented storage management 147
5.7. 1 Implementation of request segmentation 147
* * * enjoyment and protection in paragraph 5.7.2 149
5.7.3 Page Storage Management of Request Segment 150
5.8 UNIX storage management 150
5.8. 1 exchange 15 1
Paging request 152
5.8.3 Page changing process 154
Summary 155
Improve the training of Windows 7 4
Memory performance 155
Exercise in this chapter 156
Chapter VI Equipment Management 159
6. 1 overview 159
6. 1. 1 equipment management
Objectives and functions 160
6. 1.2 classification of computer equipment 160
6. Composition of1.3 I/O system 162
6.2 I/O processing steps 166
6. 2. 1 I/O system hierarchy 166
I/O interrupt handler 166
Device driver 167
Input/output manager 167
6.3 Equipment allocation and scheduling algorithm 168
6.3. 1 When managing equipment
Data structure 169
6.3.2 Configuration of special equipment 169
6.3.3 *** Scheduling of shared disks 17 1
6.4 data transmission mode 176
6.4. 1 program cycle test mode 176
6.4.2 interrupt drive I/O control mode 177
Direct memory access
(DMA) mode 179
6.4.4 Channel mode 180
6.5 Several Technologies in Equipment Management 18 1
6.5. 1 input/output buffer technology
Virtual devices and spoolers
Technology 184
6.6 UNIX device management 186
6.6. 1 buffer management of character devices 186
6.6.2 Block Equipment Buffer Management 188
Summary 190
Exercise in this chapter 19 1
Chapter VII Archives Management 193
7. 1 Overview of Archives Management 193
7. 1. 1 file system introduction 193
7. 1.2 file and its classification 194
7. 1.3 file system 196
7.2 file structure 199
7.2. Logical structure of1file and
Access method 199
7.2.2 The physical structure of the file is the same as that of the file.
Storage device 20 1
7.3 File Management and Directory Structure 204
7.3. 1 file control block and
Index node 205
File directory structure 206
7.3.3 Implementing "Access by Name" 208
7.4 Management of file storage space 209
7.4. 1 location map method 2 10
7.4.2 Free area table method 2 10
7.4.3 Idle list method 2 1 1
7.5 * * * The enjoyment and protection of documents 2 12
7.5. 1 file enjoys * * * 2 12.
7.5.2 Protection and confidentiality of documents 2 13
7.6 UNIX file management 2 15
7.6. Overview of1UNIX file system
7.6.2 Physical structure of file 2 16
7.6.3 Index Node Management 2 17
7.6.4 Management of file storage space 2 18
7.6.5 Directory Management 2 19
Summary 220
Exercise 5 Optimizing Windows 7
The disk subsystem 220
Exercise 222 in this chapter
* Chapter VIII Protection and Security of Operating System 224
8. 1 Introduction 224
8. 1. 1 System security content and
Property 225
8. 1.2 system security threats
Type 226
8. 1.3 threats to various resources 227
8. 1.4 information technology security assessment
Public standard 229
8.2 Security Mechanism of Operating System 23 1
8.2. 1 identification and authentication 23 1
8.2.2 Trusted Path231
8.2.3 Minimum Privilege Management 232
Access control 233
8.2.5 Detection and Control of Hidden Channels 235
Security audit 236
8.3 Data encryption technology 236
8.3. 1 Overview of data encryption technology 236
8.3.2 Digital Signature and Digital Certificate 238
8.3.3 Network Encryption Technology 240
8.4 Authentication Technology 240
Password-based authentication
Technology 240
8.4.2 Authentication based on physical tags
Technology 242
8.4.3 Authentication based on public key
Technology 243
8.5 firewall technology 244
8.5. 1 packet filtering firewall 244
8.5.2 Agency service technology 245
8.5.3 Rule Check Firewall 247
8.6 Design and Implementation of Secure Operating System 248
8.6. 1 Operating System Security Design
Principle 248
Security policy 249
8.6.3 Security model 25 1
Security architecture 253
Summary 255
Training 6 Windows 7 operating system
Security mechanism 255
Exercise 257 in this chapter
* Chapter 9 Introduction to Typical Operating System 259
9. 1 network operating system 259
9. 1. 1 network operating system overview 259
9. 1.2 Functions of network operating system
Provided by 9. 1.3 network operating system.
Service 263
9.2 Distributed Operating System 264
Overview of Distributed Systems 264
9.2.2 Distributed Process Communication 265
9.2.3 Distributed Resource Management 266
9.2.4 distributed process synchronization 267
Deadlock in distributed system 267
9.2.6 Distributed File System 268
9.2.7 Distributed Process Migration 269
9.3 Embedded Real-time Operating System 269
9.3. 1 Embedded System Foundation
Concept 270
9.3.2 Embedded Operating System 27 1
Introduction to 9.3.3 μC/OS-II 274
Summary 275
Exercise 275 in this chapter
Reference 276