| |
| |
Preface | |
| |
| |
Computer System Overview | |
| |
| |
Basic Elements | |
| |
| |
Processor Registers | |
| |
| |
Instruction Execution | |
| |
| |
Interrupts | |
| |
| |
Interconnection Structures | |
| |
| |
The Memory Hierarchy | |
| |
| |
Cache Memory | |
| |
| |
Input/Output Organization | |
| |
| |
I/O Communication Techniques | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Appendix 1A Performance Characteristics of Two-Level Memories | |
| |
| |
Appendix 1B Procedure Control | |
| |
| |
Operating System Overview | |
| |
| |
Operating System Objectives and Functions | |
| |
| |
The Evolution of Operating Systems | |
| |
| |
Major Achievements | |
| |
| |
Example Systems | |
| |
| |
Outline of the Remainder of the Book | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Process Description and Control | |
| |
| |
Process States | |
| |
| |
Process Description | |
| |
| |
Process Control | |
| |
| |
Processes and Threads | |
| |
| |
Examples of Process Description and Control | |
| |
| |
Summary | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Concurrency | |
| |
| |
Principles of Concurrency | |
| |
| |
Mutual Exclusion--Software Approaches | |
| |
| |
Mutual Exclusion--Hardware Support | |
| |
| |
Mutual Exclusion--Operating System Support | |
| |
| |
Deadlock | |
| |
| |
Classic Problems in Concurrency | |
| |
| |
Example Systems | |
| |
| |
Summary | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Memory Management | |
| |
| |
Memory Management Requirements | |
| |
| |
Loading Programs into Main Memory | |
| |
| |
Virtual Memory--Hardware and Control Structures | |
| |
| |
Virtual Memory--Operating System Software | |
| |
| |
Examples of Memory Management | |
| |
| |
Summary | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Appendix 5A Loading and Linking | |
| |
| |
Appendix 5B Hash Tables | |
| |
| |
Scheduling | |
| |
| |
Types of Scheduling | |
| |
| |
Scheduling Algorithms | |
| |
| |
Multiprocessor Scheduling | |
| |
| |
Real-Time Scheduling | |
| |
| |
Example Systems | |
| |
| |
Summary | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Appendix 6A Response Time | |
| |
| |
I/O Management and Disk Scheduling | |
| |
| |
I/O Devices | |
| |
| |
Organization of the I/O Function | |
| |
| |
Operating System Design Issues | |
| |
| |
I/O Buffering | |
| |
| |
Disk I/O | |
| |
| |
Example Systems | |
| |
| |
Summary | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Appendix 7A Secondary Storage Devices | |
| |
| |
File Management | |
| |
| |
Overview | |
| |
| |
File Organization and Access | |
| |
| |
File Directories | |
| |
| |
File Sharing | |
| |
| |
Record Blocking | |
| |
| |
Secondary Storage Management | |
| |
| |
Example System--UNIX System V | |
| |
| |
Summary | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Networking and Distributed Processing | |
| |
| |
Communications Architecture | |
| |
| |
Servers | |
| |
| |
Process Migration | |
| |
| |
Distributed Process Communication | |
| |
| |
Distributed Process Management--Mutual Exclusion | |
| |
| |
Distributed Process Management--Deadlock | |
| |
| |
Summary | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Security | |
| |
| |
Security Threats | |
| |
| |
Computer Security | |
| |
| |
Trusted Systems | |
| |
| |
Network Security | |
| |
| |
Viruses and Related Threats | |
| |
| |
Summary | |
| |
| |
Recommended Reading | |
| |
| |
Problems | |
| |
| |
Appendix 10A Encryption | |
| |
| |
Queuing Analysis | |
| |
| |
Why Queuing Analysis? | |
| |
| |
Queuing Models | |
| |
| |
Single-Server Queues | |
| |
| |
Multiserver Queues | |
| |
| |
Networks of Queues | |
| |
| |
Examples | |
| |
| |
Other Queuing Models | |
| |
| |
Recommended Reading | |
| |
| |
Annex A Just Enough Probability and Statistics | |
| |
| |
Glossary | |
| |
| |
References | |
| |
| |
Index | |