Current location - Quotes Website - Personality signature - Operating system book catalog
Operating system book catalog
Chapter 1 Introduction 1

1. 1 operating system overview 1

1. 1. 1 the concept of operating system 2

1. 1.2 target 2 of the operating system

1. 1.3 The role of the operating system 3

Research on 1. 1.4 Operating System

Several viewpoints 4

1.2 development history of operating system 5

1.2. 1 Promote the development of the operating system.

Power 5

1.2.2 Historical evolution of operating system 6

1.2.3 Main achievements of operating system 1 1

1.2.4 Modern operating system type 12

1.3 Features and functions of operating system 15

Functions of 1.3. 1 operating system 15

1.3.2 operating system functions 17

Overview of UNIX operating system 1.4 18

1.4. 1 UNIX history 18

The function of 1. 4. 2 Unix 19

1.4.3 UNIX architecture

1.4.4 UNIX user interface 20

Summary 2 1

Training 1 installing Windows 722

Training 2 Windows 7 System Management 23

Exercise 25 in this chapter

Chapter 2 Operating System Structure 27

2. 1 operating system services 27

2. 1. 1 user interface of operating system 28

2. 1.2 Program Interface of Operating System 29

2.2 Design and Implementation of Operating System 32

Design objective 32

Design process 32

2.2.3 The realization of the design 33

2.3 Overview of Operating System Structure 33

2.3. 1 computer system organization 33

Computer system architecture 34

2.3.3 General Operating System Architecture 35

Summary 38

Exercise 38 in this chapter

Chapter 3 Process Management Page 40

3. 1 Basic concept of process 40

3. 1. 1 process introduction 40

3. Definition and characteristics of1.2 Process 4 1

3. 1.3 process state and its transformation 42

3. 1.4 process composition 44

3. 1.5 process control block 45

3.2 Process Control 46

3.2. 1 process creation 47

3.2.2 Termination of Process 48

3.2.3 Process Blocking and Wake-up 48

3.2.4 Suspension and Activation of Process 49

3.3 Process Synchronization 49

Basic concepts of process synchronization 50

3.3.2 Process synchronization mechanism 5 1

The locking mechanism 52

3.4 Semaphore Mechanism 52

3.4. 1 signal mechanism definition 53

3.4.2 semaphore mechanism to achieve mutual exclusion 55

3.4.3 Semaphore Mechanism for Synchronization 56

3.4.4 Implementation of semaphore mechanism

Resource allocation 56

3.5 Using semaphore mechanism to solve the classic

Process synchronization problem 58

Producer-consumer problem 58

3.5.2 Reader-Author Questions 58

3.5.3 philosopher dining problem 59

*3.6 Tube side mechanism 60

3.6. 1 Basic concept of pipe pass 6 1

3.6.2 Solving the problem of "producer-

Consumer problem "6 1

3.7 Process Communication 62

3.7. 1 process communication type 63

3.7.2 Message communication 63

3.8 Thread 66

3.8. 1 Basic concepts of threads 67

3.8.2 Synchronization and communication between threads 68

3.8.3 Implementation of Threads 69

3.9 UNIX process management 70

UNIX process description 70

3.9.2 UNIX process state and its transition 7 1

UNIX process control 72

3.9.4 Synchronization and communication of UNIX processes 73

Summary 74

Training 3 Windows 7 Task Manager

Process management 75

Exercise 76 in this chapter

Chapter 4 Processor Scheduling and Deadlock 80

4. 1 Basic concept of processor scheduling 80

4. 1. 1 processor scheduling level 80

4. 1.2 scheduling queue model 8 1

4. 1.3 scheduling performance evaluation criteria 83

4.2 Operation Plan 84

4.2. 1 operational concept 84

4.2.2 Operation Status and Transition 85

Operation plan 86

4.2.4 Job Scheduling Algorithm 87

4.3 Process arrangement 90

4.3. 1 process scheduling function 90

4.3.2 Schedule of Process Scheduling 90

4.3.3 Process scheduling performance evaluation 9 1

4.3.4 process scheduling algorithm 9 1

4.4 Deadlock 95

4.4. 1 deadlock reason 95

4.4.2 Necessary conditions for deadlock 96

4.4.3 Basic methods of deadlock handling 96

Prevent deadlock 97

4.5 Resource Allocation Diagram and Deadlock Theorem 98

Resource allocation chart 98

4.5.2 Deadlock Theorem 98

4.6 Avoiding Deadlock 99

4.6. 1 system resource allocation status 100

4.6.2 Bankers with Single Resources

Algorithm 100

4.6.3 Bankers with multiple resources

Algorithm 102

4.7 Deadlock Detection and Recovery 103

4.7. 1 deadlock detection opportunity 104

4.7.2 Deadlock Detection Method 104

4.7.3 Deadlock Elimination 105

4.7.4 Comprehensive method to deal with deadlock 106

4.8 UNIX process scheduling 106

Summary 108

Exercise in this chapter 108

Chapter 5 Memory Management 1 1 1

5. 1 Overview of memory management11/

5. 1. 1 memory hierarchy 1 12

5. 1.2 Purpose of storage management 1 12

5. 1.3 storage management function 1 12

5.2 Partition Storage Management 1 15

5.2. 1 Single continuous partition storage

Management 1 15

5.2.2 Fixed partition storage management 1 17

5.2.3 Variable partition storage management 1 19

5.3 Paged Storage Management 125

5.3. 1 paging storage management

Basic ideas 125

5.3.2 Address Translation and Storage Protection 127

5.3.3 Organization and management of memory blocks 130

Paged storage management

Features and disadvantages 13 1

5.4 segmented storage management 132

5.4. 1 segmented storage management mode

Introduction 132

5.4.2 Segmented storage management

Basic ideas 133

* * * Enjoy 134 in clause 5.4.3.

5.4.4 Comparison between Pagination and Segmentation 134

5.4.5 Page-by-page storage management mode 135

5.5 The concept of virtual memory 136

5.5. 1 introducing virtual memory 137

5.5.2 Implementation of Virtual Memory 138

5.6 Request Paged Storage Management 139

5.6. 1 Request paging storage management

Basic ideas 139

5.6.2 Page Missing Interrupt and Address Translation 140

5.6.3 Page Elimination Algorithm 142

5.6.4 Request paging storage management

Advantages and disadvantages 146

5.7 Request segmented storage management 147

5.7. 1 Implementation of request segmentation 147

* * * enjoyment and protection in paragraph 5.7.2 149

5.7.3 Page Storage Management of Request Segment 150

5.8 UNIX storage management 150

5.8. 1 exchange 15 1

Paging request 152

5.8.3 Page changing process 154

Summary 155

Improve the training of Windows 7 4

Memory performance 155

Exercise in this chapter 156

Chapter VI Equipment Management 159

6. 1 overview 159

6. 1. 1 equipment management

Objectives and functions 160

6. 1.2 classification of computer equipment 160

6. Composition of1.3 I/O system 162

6.2 I/O processing steps 166

6. 2. 1 I/O system hierarchy 166

I/O interrupt handler 166

Device driver 167

Input/output manager 167

6.3 Equipment allocation and scheduling algorithm 168

6.3. 1 When managing equipment

Data structure 169

6.3.2 Configuration of special equipment 169

6.3.3 *** Scheduling of shared disks 17 1

6.4 data transmission mode 176

6.4. 1 program cycle test mode 176

6.4.2 interrupt drive I/O control mode 177

Direct memory access

(DMA) mode 179

6.4.4 Channel mode 180

6.5 Several Technologies in Equipment Management 18 1

6.5. 1 input/output buffer technology

Virtual devices and spoolers

Technology 184

6.6 UNIX device management 186

6.6. 1 buffer management of character devices 186

6.6.2 Block Equipment Buffer Management 188

Summary 190

Exercise in this chapter 19 1

Chapter VII Archives Management 193

7. 1 Overview of Archives Management 193

7. 1. 1 file system introduction 193

7. 1.2 file and its classification 194

7. 1.3 file system 196

7.2 file structure 199

7.2. Logical structure of1file and

Access method 199

7.2.2 The physical structure of the file is the same as that of the file.

Storage device 20 1

7.3 File Management and Directory Structure 204

7.3. 1 file control block and

Index node 205

File directory structure 206

7.3.3 Implementing "Access by Name" 208

7.4 Management of file storage space 209

7.4. 1 location map method 2 10

7.4.2 Free area table method 2 10

7.4.3 Idle list method 2 1 1

7.5 * * * The enjoyment and protection of documents 2 12

7.5. 1 file enjoys * * * 2 12.

7.5.2 Protection and confidentiality of documents 2 13

7.6 UNIX file management 2 15

7.6. Overview of1UNIX file system

7.6.2 Physical structure of file 2 16

7.6.3 Index Node Management 2 17

7.6.4 Management of file storage space 2 18

7.6.5 Directory Management 2 19

Summary 220

Exercise 5 Optimizing Windows 7

The disk subsystem 220

Exercise 222 in this chapter

* Chapter VIII Protection and Security of Operating System 224

8. 1 Introduction 224

8. 1. 1 System security content and

Property 225

8. 1.2 system security threats

Type 226

8. 1.3 threats to various resources 227

8. 1.4 information technology security assessment

Public standard 229

8.2 Security Mechanism of Operating System 23 1

8.2. 1 identification and authentication 23 1

8.2.2 Trusted Path231

8.2.3 Minimum Privilege Management 232

Access control 233

8.2.5 Detection and Control of Hidden Channels 235

Security audit 236

8.3 Data encryption technology 236

8.3. 1 Overview of data encryption technology 236

8.3.2 Digital Signature and Digital Certificate 238

8.3.3 Network Encryption Technology 240

8.4 Authentication Technology 240

Password-based authentication

Technology 240

8.4.2 Authentication based on physical tags

Technology 242

8.4.3 Authentication based on public key

Technology 243

8.5 firewall technology 244

8.5. 1 packet filtering firewall 244

8.5.2 Agency service technology 245

8.5.3 Rule Check Firewall 247

8.6 Design and Implementation of Secure Operating System 248

8.6. 1 Operating System Security Design

Principle 248

Security policy 249

8.6.3 Security model 25 1

Security architecture 253

Summary 255

Training 6 Windows 7 operating system

Security mechanism 255

Exercise 257 in this chapter

* Chapter 9 Introduction to Typical Operating System 259

9. 1 network operating system 259

9. 1. 1 network operating system overview 259

9. 1.2 Functions of network operating system

Provided by 9. 1.3 network operating system.

Service 263

9.2 Distributed Operating System 264

Overview of Distributed Systems 264

9.2.2 Distributed Process Communication 265

9.2.3 Distributed Resource Management 266

9.2.4 distributed process synchronization 267

Deadlock in distributed system 267

9.2.6 Distributed File System 268

9.2.7 Distributed Process Migration 269

9.3 Embedded Real-time Operating System 269

9.3. 1 Embedded System Foundation

Concept 270

9.3.2 Embedded Operating System 27 1

Introduction to 9.3.3 μC/OS-II 274

Summary 275

Exercise 275 in this chapter

Reference 276