1y ago
7.07 MB
552 Pages
Last View : 18d ago
Last Download : 2m ago
Upload by : Hayden Brunner


Other bestselling titles by Andrew S. TanenbaumStructured Computer Organization, 5th editionThis widely read classic, now in its fifth edition, provides the ideal introduction tocomputer architecture. It covers the topic in an easy-to-understand way, bottomup. There is a chapter on digital logic for beginners, followed by chapters onmicroarchitecture, the instruction set architecture level, operating systems, assembly language, and parallel computer architectures.THIRD EDITIONComputer Networks, 4th editionThis best seller, currently in its fourth edition, provides the ideal introduction totoday's and tomorrow's networks. It explains in detail how modern networks arestructured. Starting with the physical layer and working up to the applicationlayer, the book covers a vast number of important topics, including wireless communication, fiber optics, data link protocols, Ethernet, routing algorithms, networkperformance, security, DNS, electronic mail, the World Wide Web, and multimedia. The book has especially thorough coverage of TCP/IP and the Internet.Operating Systems: Design and Implementation, 3rd editionThis popular text on operating systems is the only book covering both the principles of operating systems and their application to a real system. All the traditionaloperating systems topics are covered in detail. In addition, the principles are carefully illustrated with MINIX, a free POSIX-based UNIX-like operating system forpersonal computers. Each book contains a free CD-ROM containing the completeMINIX system, including all the source code. The source code is listed in anappendix to the book and explained in detail in the text.Vrije UniversiteitAmsterdam, The NetherlandsDistributed Operating Systems, 2nd editionThis text covers the fundamental concepts of distributed operating systems. Keytopics include communication and synchronization, processes and processors, distributed shared memory, distributed file systems, and distributed real-time systems. The principles are illustrated using four chapter-long examples: distributedobject-based systems, distributed file systems, distributed Web-based systems,and distributed coordination-based systems.PEARSON PEARSON EDUCATION INTERNATIONAL

If you purchased this book within the United States or Canada you should be aware that it has been wrongfully imported without theapproval of the Publisher or the Author.Editorial Director, Computer Science, Engineering, and Advanced Mathematics: Mania J. Ho/tonExecutive Editor: Tracy DimkelbergerEditorial Assistant: Melinda HaggertyAssociate Editor: ReeAnne DaviesSenior Managing Editor Scot! DisaunoProduction Editor: Irwin ZuckerInterior design: Andrew S. TanenbatonTypesetting: Andrew S. TanenbaumArt Director: Kenny BeckArt Editor Gregory DullesMedia Editor: David AlickManufacturing Manager: Alan FischerManufacturing Buyer: Lisa McDowellMarketing Manager: Mack PattersonPEARSON 2009 Pearson Education, Inc.Pearson Prentice HallPearson Education, Inc.Upper Saddle River, NJ 07458Ail rights reserved. No part of this book may be reproduced in any form or by any means, without permission in writing from thepublisher.Pearson Prentice Hail is a trademark of Pearson Education, Inc.The author and publisher of this book have used their best efforts in preparing this book. These efforts include the development,research, and testing of the theories and programs to determine their effectiveness. The author and publisher make no warranty of anykind, expressed or implied, with regard to these programs or the documentation contained in this book. The author and publishershall not be liable in any event for incidental or consequential damages in connection with, or arising out of, thefurnishing, performance, or use of these programs.Printed in the United States of America109 8 7 6 5 4 3ISBN21Q-lB-filBMST-LPearson Education Ltd., LondonPearson Education Australia Pty. Ltd., SydneyPearson Education Singapore, Pte. Ltd.Pearson Education North Asia Ltd., Hong KongPearson Education Canada, Inc., TorontoPearson Educacidn de Mexico, S.A. de C.V.Pearson Education—Japan, TokyoPearson Education Malaysia, Pte. Ltd.Pearson Education, Inc., Upper Saddle River, New JerseyTo Suzanne, Barbara, Marvin, and the memory of Brant and Sweetie %

CONTENT!3xxivPREFACE1INTRODUCTION1.11WHAT IS AN OPERATING SYSTEM?31.1.1 The Operating System as an Extended Machine 41.1.2 The Operating System as a Resource Manager 61.2HISTORY OF OPERATING SYSTEMS 71.2.1 The First Generation (1945-55) Vacuum Tubes 71.2.2 The Second Generation (1955-65) Transistors and Batch Systems1.2.3 The Third Generation (1965-1980) ICs and Multiprogramming 101.2.4 The Fourth Generation (1980-Present) Personal Computers 131.3 COMPUTER HARDWARE REVIEW 171.3.1 Processors 171.3.2 Memory 211.3.3 Disks 241.3.4 Tapes 251.3.5 I/O Devices 251.3.6 Buses 281.3.7 Booting the Computer 31vii8

viiiCONTENTS1.4 THE OPERATING SYSTEM ZOO 311.4.1 Mainframe Operating Systems 321.4.2 Server Operating Systems 321.4.3 Multiprocessor Operating Systems 321.4.4 Personal Computer Operating Systems 331.4.5 Handheld Computer Operating Systems 331.4.6 Embedded Operating Systems. 331.4.7 Sensor Node Operating Systems 341.4.8 Real-Time Operating Systems 341.4.9 Smart Card Operating Systems 351.5 OPERATING SYSTEM CONCEPTS 351.5.1 Processes 361.5.2 Address Spaces 381.5.3 Files 381.5.4 Input/Output 411.5.5 Protection 421.5.6 The Shell 421.5.7 Ontogeny Recapitulates Phylogeny 441.6 SYSTEM CALLS 471.6.1 System Calls for Process Management 501.6.2 System Calls for File Management 541.6.3 System Calls for Directory Management 551.6.4 Miscellaneous System Calls 561.6.5 The Windows Win32 API 571.7 OPERATING SYSTEM STRUCTURE 601.7.1 Monolithic Systems 601.7.2 Layered Systems 611.7.3 Microkernels 621.7.4 Client-Server Model 651.7.5 Virtual Machines 651.7.6 Exokeraels 691.8 THE WORLD ACCORDING TO C 701.8.1 The C Language 701.8.2 Header Files 711.8.3 Large Programming Projects 721.8.4 The Model of Run Time 731.9 RESEARCH ON OPERATING SYSTEMS 74CONTENTS1.10 OUTLINE OF THE REST OF THIS BOOK 751.11 METRIC UNITS 761.12 SUMMARY 772PROCESSES AND THREADS2.1 PROCESSES 812.1.1 The Process Model 822.1.2 Process Creation 842.1.3 Process Termination 862.1.4 Process Hierarchies 872.1.5 Process States 882.1.6 Implementation of Processes 892.1.7 Modeling Multiprogramming 912.2 THREADS 932.2.1 Thread Usage 932.2.2 The Classical Thread Model 982.2.3 POSIX Threads 1022.2.4 Implementing Threads in User Space 1042.2.5 Implementing Threads in the Kernel 1072.2.6 Hybrid Implementations 1082.2.7 Scheduler Activations 1092.2.8 Pop-Up Threads 1102.2.9 Making Single-Threaded Code Multithreaded 1122.3 INTERPROCESS COMMUNICATION 1152.3.1 Race Conditions 1152.3.2 Critical Regions 1172.3.3 Mutual Exclusion with Busy Waiting 1182.3.4 Sleep and Wakeup 1232.3.5 Semaphores 1262.3.6 Mutexes 1282.3.7 Monitors 1322.3.8 Message Passing 1382.3.9 Barriers 142

CONTENTSCONTENTSX3.4.9 The WSClock Page Replacement Algorithm 2113.4.10 Summary of Page Replacement Algorithms 2132.4 SCHEDULING 1432.4.1 Introduction to Scheduling 1432.4.2 Scheduling in Batch Systems 1502.4.3 Scheduling in Interactive Systems 1522.4.4 Scheduling in Real-Time Systems 1582.4.5 Policy versus Mechanism 1592.4.6 Thread Scheduling 1603.5 DESIGN ISSUES FOR PAGING SYSTEMS 2143.5.1 Local versus Global Allocation Policies 2143.5.2 Load Control 2163.5.3 Page Size 2173.5.4 Separate Instruction and Data Spaces 2193.5.5 Shared Pages 2193.5.6 Shared Libraries 2213.5.7 Mapped Files 2233.5.8 Cleaning Policy 2243.5.9 Virtual Memory Interface 2242.5 CLASSICAL IPC PROBLEMS 1612.5.1 The Dining Philosophers Problem 1622.5.2 The Readers and Writers Problem 1652.6 RESEARCH ON PROCESSES AND THREADS 1662.7 SUMMARY3167MEMORY MANAGEMENT3.1 NO MEMORY ABSTRACTION1741733.6 IMPLEMENTATION ISSUES 2253.6.1 Operating System Involvement with Paging 2253.6.2 Page Fault Handling 2263.6.3 Instruction Backup 2273.6.4 Locking Pages in Memory 2283.6.5 Backing Store 2293.6.6 Separation of Policy and Mechanism 2313.2 A MEMORY ABSTRACTION: ADDRESS SPACES 1773.2.1 The Notion of an Address Space 1783.2.2 Swapping 1793.2.3 Managing Free Memory 1823.7 SEGMENTATION 2323.7.1 Implementation of Pure Segmentation 2353.7.2 Segmentation with Paging: MULTICS 2363.7.3 Segmentation with Paging: The Intel Pentium 2403.3 VIRTUAL MEMORY 1863.3.1 Paging 1873.3.2 Page Tables 1913.3.3 Speeding Up Paging 1923.3.4 Page Tables for Large Memories 1963.8 RESEARCH ON MEMORY MANAGEMENT 2453.4 PAGE REPLACEMENT ALGORITHMS 1993.4.1 The Optimal Page Replacement Algorithm 2003.4.2 The Not Recently Used Page Replacement Algorithm 2013.4.3 The First-In, First-Out (FIFO) Page Replacement Algorithm 2023.4.4 The Second-Chance Page Replacement Algorithm 2023.9 SUMMARY 2464FILE S Y S T E M S4.1 FILES 2554.1.1 Fit.- W-ming 2553.4.5 The Clock Page Replacement Algorithm 2034.1.2 F i g g c t u r e3.4.6 The Least Recently Used (LRU) Page Replacement Algorithm 2043.4.7 Simulating LRU in Software 2053.4.8 The Working Set Page Replacement Algorithm 2074.1.3 F i i w s2572584.1.4 File Access 2604.1.5 File Attributes 261

CONTENTSxii4.1.6 File Operations 2624.1.7 An Example Program Using File System Calls 2634.2 DIRECTORIES 2664.2.1 Single-Level Directory Systems 2664.2.2 Hierarchical Directory Systems 2664.2.3 Path Names 2674.2.4 Directory Operations 2704.3 FILE SYSTEM IMPLEMENTATION 2714.3.1 File System Layout 2714.3.2 Implementing Files 2724.3.3 Implementing Directories 2784.3.4 Shared Files 2814.3.5 Log-Structured File Systems 2834.3.6 Journaling File Systems 2854.3.7 Virtual File Systems 2864.4 FILE SYSTEM MANAGEMENT AND OPTIMIZATION 2904.4.1 Disk Space Management 2904.4.2 File System Backups 2964.4.3 File System Consistency 3024.4.4 File System Performance 3054.4.5 Defragmenting Disks 3094.5 EXAMPLE FILE SYSTEMS 3104.5.1 CD-ROM File Systems 3104.5.2 The MS-DOS File System 3164.5.3 The UNIX V7 File System 319CONTENTS5.1.3 Memory-Mapped I/O 3305.1.4 Direct Memory Access (DMA) 3345.1.5 Interrupts Revisited 3375.2 PRINCIPLES OF I/O SOFTWARE 3415.2.1 Goals of the I/O Software 3415.2.2 Programmed I/O 3425.2.3 Interrupt-Driven I/O 3445.2.4 I/O Using DMA 3455.3 I/O SOFTWARE LAYERS 3465.3.1 Interrupt Handlers 3465.3.2 Device Drivers 3475.3.3 Device-Independent I/O Software 3515.3.4 User-Space I/O Software 3575.4 DISKS 3585.4.1 Disk Hardware 3595.4.2 Disk Formatting 3745.4.3 Disk Arm Scheduling Algorithms 3775.4.4 Error Handling 3805.4.5 Stable Storage 3835.5 CLOCKS 3865.5.1 Clock Hardware 3865.5.2 Clock Software 3885.5.3 Soft Timers 3914.6 RESEARCH ON FILE SYSTEMS 3225.6 USER INTERFACES: KEYBOARD, MOUSE, MONITOR 3925.6.1 Input Software 3925.6.2 Output Software 3974.7 SUMMARY 3225.7 THIN CLIENTS 4135INPUT/OUTPUT5.1 PRINCIPLES OF I/O HARDWARE 3275.1.1 I/O Devices 3285.1.2 Device Controllers 3295.8 POWER MANAGEMENT 4155.8.1 Hardware Issues 4165.8.2 Operating System Issues 4175.8.3 Application Program Issues 4225.9 RESEARCH ON INPUT/OUTPUT 4235.10 SUMMARY 424

Xiv6CONTENTSCONTENTSDEADLOCKS6.1 RESOURCES 4326.1.1 Preemptable and Nonpreemptable Resources 4326.1.2 Resource Acquisition 4336.2 INTRODUCTION TO DEADLOCKS 4356.2.1 Conditions for Resource Deadlocks 4366.2.2 Deadlock Modeling 4366.3 THE OSTRICH ALGORITHM 4396.4 DEADLOCK DETECTION AND RECOVERY 4406.4.1 Deadlock Detection with One Resource of Each Type 4406.4.2 Deadlock Detection with Multiple Resources of Each Type6.4.3 Recovery from Deadlock 4457MULTIMEDIA O P E R A T I N G S Y S T E M S7.1 INTRODUCTION TO MULTIMEDIA 4667.2 MULTIMEDIA FILES 4707.2.1 Video Encoding 4717.2.2 Audio Encoding 4747.3 VIDEO COMPRESSION 4767.3.1 The JPEG Standard 4767.3.2 The MPEG Standard 4797.4 AUDIO COMPRESSION .4827.5 MULTIMEDIA PROCESS SCHEDULING 4857.5.1 Scheduling Homogeneous Processes 4867.5.2 General Real-Time Scheduling 4867.5.3 Rate Monotonic Scheduling 4887.5.4 Earliest Deadline First Scheduling 4896.5 DEADLOCK AVOIDANCE 4466.5.1 Resource Trajectories 4476.5.2 Safe and Unsafe States 4486.5.3 The Banker's Algorithm for a Single Resource 4496.5.4 The Banker's Algorithm for Multiple Resources 4507.6 MULTIMEDIA FILE SYSTEM PARADIGMS 4917.6.1 VCR Control Functions 4927.6.2 Near Video on Demand 4947.6.3 Near Video on Demand with VCR Functions 4966.6 DEADLOCK PREVENTION 4526.6.1 Attacking the Mutual Exclusion Condition 4526.6.2 Attacking the Hold and Wait Condition 4536.6.3 Attacking the No Preemption Condition 4536.6.4 Attacking the Circular Wait Condition 4547.7 FILE PLACEMENT 4977.7.1 Placing a File on a Single Disk 4987.7.2 Two Alternative File Organization Strategies 4997.7.3 Placing Files for Near Video on Demand 5027.7.4 Placing Multiple Files on a Single Disk 5047.7.5 Placing Files on Multiple Disks 5066.7 OTHER ISSUES 4556.7.1 Two-Phase Locking 4556.7.2 Communication Deadlocks 4566.7.3 Livelock 4576.7.4 Starvation 4596.8 RESEARCH ON DEADLOCKS 4596.9 SUMMARY 4607.8 CACHING 5087.8.1 Block Caching 5097.8.2 File Caching 5107.9 DISK SCHEDULING FOR MULTIMEDIA 5117.9.1 Static Disk Scheduling 5117.9.2 Dynamic Disk Scheduling 5137.10 RESEARCH ON MULTIMEDIA 5147.11 SUMMARY 515

xvi8CONTENTSCONTENTSMULTIPLE P R O C E S S O R S Y S T E M S8.1 MULTIPROCESSORS 5248.1.1 Multiprocessor Hardware 5248.1.2 Multiprocessor Operating System Types 5328.1.3 Multiprocessor Synchronization 5368.1.4 Multiprocessor Scheduling 5408.2 MULTICOMPUTERS 5468.2.1 Multicomputer Hardware 5478.2.2 Low-Level Communication Software 5518.2.3 User-Level Communication Software 5538.2.4 Remote Procedure Call 5568.2.5 Distributed Shared Memory 5588.2.6 Multicomputer Scheduling 5638.2.7 Load Balancing 5638.3 VIRTUALIZATION 5668.3.1 Requirements for Virtualization 5688.3.2 Type I Hypervisors 5698.3.3 Type 2 Hypervisors 5708.3.4 Paravirtualization 5728.3.5 Memory Virtualization 5748.3.6 I/O Virtualization 5768.3.7 Virtual Appliances 5778.3.8 Virtual Machines on Multicore CPUs 5778.3.9 Licensing Issues 5788.4 DISTRIBUTED SYSTEMS 5788.4.1 Network Hardware 5818.4.2 Network Services and Protocols 5848.4.3 Document-Based Middleware 5888.4.4 File-System-Based Middleware 5898.4.5 Object-Based Middleware 5948.4.6 Coordination-Based Middleware 5968.4.7 Grids 6018.5 RESEARCH ON MULTIPLE PROCESSOR SYSTEMS 6028.6 SUMMARY 6035219SECURITY9.1 THE SECURITY ENVIRONMENT 6119.1.1 Threats 6119.1.2 Intruders 6139.1.3 Accidental Data Loss 6149.2 BASICS OF CRYPTOGRAPHY 6149.2.1 Secret-Key Cryptography 6159.2.2 Public-Key Cryptography 6169.2.3 One-Way Functions 6179.2.4 Digital Signatures 6179.2.5 Trusted Platform Module 6199.3 PROTECTION MECHANISMS 6209.3.1 Protection Domains 6209.3.2 Access Control Lists 6229.3.3 Capabilities 6259.3.4 Trusted Systems 6289.3.5 Trusted Computing Base 6299.3.6 Formal Models of Secure Systems 6309.3.7 Multilevel Security 6329.3.8 Covert Channels 6359.4 AUTHENTICATION 6399.4.1 Authentication Using Passwords 6409.4.2 Authentication Using a Physical Object 6499.4.3 Authentication Using Biometrics 6519.5 INSIDER ATTACKS 6549.5.1 Logic Bombs 6549.5.2 Trap Doors 6559.5.3 Login Spooling 6569.6 EXPLOITING CODE BUGS 6579.6.1 Buffer Overflow Attacks 6589.6.2 Format String Attacks 6609.6.3 Return to libc Attacks 6629.6.4 Integer Overflow Attacks 6639.6.5 Code Injection Attacks 6649.6.6 Privilege Escalation Attacks 665

xviiiCONTENTSCONTENTS9.7 MALWARE 6659.7.1 Trojan Horses 6689.7.2 Viruses 6709.7.3 Worms 6809.7.4 Spyware 6829.7.5 Rootkits 68610.3 PROCESSES IN LINUX 73510.3.1 Fundamental Concepts 73510.3.2 Process Management System Calls in Linux 73710.3.3 Implementation of Processes and Threads in Linux 74110.3.4 Scheduling in Linux 74810.3.5 Booting Linux 7519.8 DEFENSES 69010.4 MEMORY MANAGEMENT IN LINUX 75410.4.1 Fundamental Concepts 75410.4.2 Memory Management System Calls in Linux 75710.4.3 Implementation of Memory Management in Linux 75810.4.4 Paging in Linux 7649.8.1 Firewalls 69119.8.2 Antivirus and Anti-Antivirus Techniques 6939.8.3 Code Signing 6999.8.4 Jailing 7009.8.5 Model-Based Intrusion Detection 7019.8.6 Encapsulating Mobile Code 7039.8.7 Java Security 707 1§19.9 RESEARCH ON SECURITY 7099.10 SUMMARY 710 HvI10 CASE STUDY 1: LINUX10.1 HISTORY OF UNIX AND LINUX 71610.1.1 UNICS 71610.1.2 PDP-11 UNIX 71710.1.3 Portable UNIX 71810.1.4 Berkeley UNIX 71910.1.5 Standard UNIX 72010.1.6 MINTX 72110.1.7 Linux 722715f §JI10.2 OVERVIEW OF LINUX 72410.2.1 Linux Goals 72510.2.2 Interfaces to Linux 72610.2.3 The Shell 72710.5 INPUT/OUTPUT IN LINUX 76710.5.1 Fundamental Concepts 76810.5.2 Networking 76910.5.3 Input/Output System Calls in Linux 77110.5.4 Implementation of Input/Output in Linux 77110.5.5 Modules in Linux 77510.6 THE LINUX FILE SYSTEM 77510.6.1 Fundamental Concepts 77610.6.2 File System Calls in Linux 78110.6.3 Implementation of the Linux File System 78410.6.4 NFS: The Network File System 79210.7 SECURITY IN LINUX 79910.7.1 Fundamental Concepts 79910.7.2 Security System Calls in Linux 80110.7.3 Implementation of Security in Linux 80210.8 SUMMARY 80211 CASE STUDY 2: WINDOWS VISTA11.1 HISTORY OF WINDOWS VISTA 80911.1.1 1980s: MS-DOS 810U.1.2 1990s: MS-DOS-based Windows 811iU.32000s:NT-basedWmdows11.1.4 Windows Vista 81410.2.5 Kernel Structure 7321xixMl809

CONTENTSXX11.2 PROGRAMMING WINDOWS VISTA 81511.2.1 The Native NT Application Programming Interface 81811.2.2 The Win32 Application Programming Interface 82111.2.3 The Windows Registry 82511.3 SYSTEM STRUCTURE 82711.3.1 Operating System Structure 82811.3.2 Booting Windows Vista 84311.3.3 Implementation of the Object Manager 84411.3.4 Subsystems, DLLs, and User-Mode Services 85411.4 PROCESSES AND THREADS IN WINDOWS VISTA 85711.4.1 Fundamental Concepts 85711.A2 Job, Process, Thread, and Fiber Management API Calls 86211.4.3 Implementation of Processes and Threads 867:11.5 MEMORY MANAGEMENT 87511.5.1 Fundamental Concepts 87511.5.2 Memory Management System Calls 88011.5.3 Implementation of Memory Management 88111.6 CACHING IN WINDOWS VISTA 89011.7 INPUT/OUTPUT IN WINDOWS VISTA 89211.7.1 Fundamental Concepts 89311.7.2 Input/Output API Calls 89411.7.3 Implementation of I/O 89711.8 THE WINDOWS NT FILE SYSTEM 90211.8.1 Fundamental Concepts 90311.8.2 Implementation of the NT File System 90411.9 SECURITY IN WINDOWS VISTA 91411.9.1 Fundamental Concepts 91511.9.2 Security API Calls 91711.9.3 Implementation of Security 91811.10 SUMMARY 920CONTENTS12 CASE STUDY 3: SYMBIAN OS12.1 THE HISTORY OF SYMBIAN OS 92612.1.1 Symbian OS Roots: Psion and EPOC 92612.1.2 Symbian OS Version 6 92712.1.3 Symbian OS Version 7 92812.1A Symbian OS Today 92812.2 AN OVERVIEW OF SYMBIAN OS 92812.2.1 Object Orientation 92912.2.2 Microkernel Design 93012.2.3 The Symbian OS Nanokemel 93112.2.4 Client/Server Resource Access 93112.2.5 Features of a Larger Operating System 93212.2.6 Communication and Multimedia 93312.3 PROCESSES AND THREADS IN SYMBIAN OS 93312.3.1 Threads and Nanothreads 93412.3.2 Processes 93512.3.3 Active Objects 93512.3.4 Interprocess Communication 93612.4 MEMORY MANAGEMENT 93712.4.1 Systems with No Virtual Memory 93712.4.2 How Symbian OS Addresses Memory 93912.5 INPUT AND OUTPUT 94112.5.1 Device Drivers 94112.5.2 Kernel Extensions 94212.5.3 Direct Memory Access 94212.5.4 Special Case: Storage Media 94312.5.5 Blocking I/O 94312.5.6 Removable Media 94412.6 STORAGE SYSTExMS 94412.6.1 File Systems for Mobile Devices 94412.6.2 Symbian OS File Systems 94512.6.3 File System Security and Protection 94512.7 SECURITY IN SYMBIAN OS 946

xxiiCONTENTS12.8 COMMUNICATION IN SYMBIAN OS 94912.8.1 Basic Infrastructure 94912.8.2 A Closer Look at the Infrastructure 95012.9 SUMMARY 95313 OPERATING SYSTEM DESIGN13.1 THE NATURE OF THE DESIGN PROBLEM 95613.1.1 Goals 95613.1.2 Why Is It Hard to Design an Operating System? 95713.2 INTERFACE DESIGN 95913.2.1 Guiding Principles 95913.2.2 Paradigms 96113.2.3 The System Call Interface 96413.3 IMPLEMENTATION 96713.3.1 System Structure 96713.3.2 Mechanism versus Policy 97113.3.3 Orthogonality 97213.3.4 Naming 97313.3.5 Binding Time 97413.3.6 Static versus Dynamic Structures

Operating Systems: Design and Implementation, 3rd edition This popular text on operating systems is the only book covering both the princi ples of operating systems and their application to a real system. All the traditional operating systems topics are covered in detail. In addition, the principles are care

Related Documents:

raise funds in public markets or to take out new bank loans. The quick recovery in asset prices following central bank action have further supported bank earnings over recent months. . ase ase Sile loo ol 2020-2022 Averse ase: Seo loo 2022 ase ase Sile loo ol 2022 Averse

for Sybase ASE . Developer Edition on Windows 7 box. C: \ Sybase \ C:\ sybase \ase-15_0 corresponds to actual ASE database installation C:\ Sybase \ocs-15_0 corresponds to bundled client software (called OCS in Sybase ASE parlance) development kit. It is interestin

Safety Installation General Use F.A.Q. Troubleshooting Warranty Appendix V1.0 1 ASE Docking Station for Iridium 9555 Handsets Contacts Table of Contents For additional information about this Product warranty, please contact your Service Provider or Point-of-Sale. For additional information about ASE products and services, please contact ASE as .

JY849A Aruba 7005 (EG) 4x 10/100/1000 ASE-T Ports 16 AP ranch ontroller JW640A Aruba 7005 (JP) FIPS/TAA-compliant 4-port 10/100/1000 ASE-T 16 AP and 1K lient ontroller JX925A Aruba 7008 (IL) 8p 100W PoE 10/100/1000 ASE-T 16 AP and 1K lient ontroller JX926A Aruba 7008 (JP) 8p 100W PoE 10/100/1000 ASE-T 16 AP

Difficulty in upgrading from Sybase 12.x to Sybase ASE 15 Many Sybase customers who have not yet upgraded to Sybase ASE 15 are considering migrating away from Sybase and toward Oracle. This is because the expense associated with a Sybase ASE 15 upgrade, in many cases, would cover

COLECTIV EDITORIAL: Prof. univ. dr. Alexandru Puiu – Fondatorul revistei şi Preşedinte al consiliului ştiinţific, Fondatorul Universităţii „Constantin Brâncoveanu" Consiliul ştiinţific: Raymundas Kalesnykas – International School of Law and Business, Vilnius, Lituania Vergil Voineagu, ASE Bucureşti Dumitru Miron, ASE Bucureşti Viorel Lefter, ASE Bucureşti

ASE-Auto Tech Maintenance & Light Repair ASE- Auto Tech Brakes ASE-Auto Tech Engine Performance . Entrepreneurship (I2) Fundamentals of Business, Marketing and Finace (GHS) Fundamentals of Web Page De

ASE- Automobile and Light Truck Technician: Suspension and Steering (A4) National Institute of Automotive Service Excellence YES ASE – Auto Maintenance and Light Repair (GI) National Institute of Automotive Service Excellence YES ASE- Automobile Service Consultant (C1) National Instit

Audience This book is intended for System Administrators and Database Administrators who want to implement simple Adaptive Server replication with ASE Replicator. How to use this book This book contains the following chapters: Chapter 1, “Introduction to ASE

Feb 02, 2002 · The Adult Education and Family Literacy Program of the Illinois Community College Board (ICCB) recognizes the Adult Basic Education (ABE)/ Adult Secondary (ASE) educators who contributed to the development of the Illinois ABE/ASE Content Standards. The dedication, c

Notice to organizations using the ASE Entry-level certification tests: The National Institute for Automotive Service Excellence (ASE) has developed these tests expressly for use in the context of student evaluation and voluntary Entry-level certification, and all future revisions and refinements will be made in that context.

Iridium 9555 and the ASE-DK050 offer an unsurpassed package of reliability, innovation, power and efficiency. 050 Docking Station For 9555 The ASE-DK050 provides office, vehicle and vessel customers with a dependable and critical

Jun 06, 2018 · SAP ASE – Feature-Packed Releases . Feature Rich Releases in Quick Succession Incremental reorg Incremental dump database Shrink DB Performance : - Insert, create index - Dump and Load Monitoring and Diagnosis. 2013. 2014. 2015. ASE 15.7. Reduce TCO. Support for SAP ERP. ASE 16. Scale, Speed. Security Scale-up on .

11.1.1 Pre-SAP ASE 12.5 Memory 321 11.1.2 SAPASE12.5and LaterMemoryUse 322 11.2 SAP ASE Configuration Basics 322 11.2.1 CurrentMemoryConfiguration 323 11.2.2 Dynamic versus Static Options 326 11.2.3 Configuration System Tables 327 11.2.4 Configuration File Parameter Format 354 11.3 Summa

Using This Documentation Overview –Provides procedures to install and configure the Oracle Solaris Cluster HA for Sybase Adaptive Server Enterprise (ASE) (HA for Sybase ASE) data service. Audience – Experienced system administrators with extensive knowledge of Oracle software and hardware. Required knowledge – Kno

May 16, 2012 · Sybase ASE Password Strength . 16 Sybase ASE Patches . 17 Sybase ASE Roles and Groups . 17 Contents. 8 Contents. Baseline Policy Manual for CIS Benchmark for Sybase A

programming in python 3.x catalin boja bogdan iancu

Operating Systems, Embedded Systems, and Real-Time Systems Janez Puhan Ljubljana, 2015. CIP-CatalogingInPublication NationalandUniversityLibrary,Ljubljana 004.451(078.5)(0.034.2) PUHAN,Janez,1969-Operating Systems, Embedded Systems, and Real-Time Systems [Electronic

Operating Systems and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common to most operating systems Know the difference between stand-alone operating systems and network operating systems Identify various stand-alone operating systems

2014 AMC 8 Problems Problem 1 Harry and Terry are each told to calculate . Harry gets the correct answer. Terry ignores the parentheses and calculates . If Harry's answer is and Terry's answer is , what is ? Solution Problem 2 Paul owes Paula 35 cents and has a pocket full of 5-cent coins, 10-cent coins, and 25-cent coins that he can use to pay her. What is the difference between the largest .