PART ONE OVERVIEW |
|
|
|
|
What Is an Operating System? |
|
|
3 | (4) |
|
|
7 | (4) |
|
|
11 | (1) |
|
|
12 | (2) |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (2) |
|
|
23 | (4) |
|
|
24 | (1) |
|
|
25 | (2) |
|
Computer-System Structures |
|
|
|
Computer-System Operation |
|
|
27 | (3) |
|
|
30 | (4) |
|
|
34 | (4) |
|
|
38 | (4) |
|
|
42 | (6) |
|
|
48 | (3) |
|
|
51 | (4) |
|
|
52 | (2) |
|
|
54 | (1) |
|
Operating-System Structures |
|
|
|
|
55 | (6) |
|
Operating-System Services |
|
|
61 | (2) |
|
|
63 | (9) |
|
|
72 | (2) |
|
|
74 | (6) |
|
|
80 | (5) |
|
System Design and Implementation |
|
|
85 | (3) |
|
|
88 | (1) |
|
|
89 | |
|
|
90 | (2) |
|
|
92 | |
PART TWO PROCESS MANAGEMENT |
|
|
|
|
|
9 | (90) |
|
|
99 | (4) |
|
|
103 | (4) |
|
|
107 | (2) |
|
Interprocess Communication |
|
|
109 | (8) |
|
Communication in Client-Server Systems |
|
|
117 | (9) |
|
|
126 | (3) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
|
|
129 | (3) |
|
|
132 | (3) |
|
|
135 | (4) |
|
|
139 | (2) |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (2) |
|
|
147 | (4) |
|
|
147 | (1) |
|
|
148 | (3) |
|
|
|
|
151 | (4) |
|
|
155 | (2) |
|
|
157 | (12) |
|
Multiple-Processor Scheduling |
|
|
169 | (1) |
|
|
170 | (2) |
|
|
172 | (5) |
|
Process Scheduling Models |
|
|
177 | (7) |
|
|
184 | (5) |
|
|
185 | (2) |
|
|
187 | (2) |
|
|
|
|
189 | (2) |
|
The Critical-Section Problem |
|
|
191 | (6) |
|
|
197 | (4) |
|
|
201 | (5) |
|
Classic Problems of Synchronization |
|
|
206 | (5) |
|
|
211 | (5) |
|
|
216 | (7) |
|
|
223 | (2) |
|
|
225 | (10) |
|
|
235 | (8) |
|
|
236 | (4) |
|
|
240 | (3) |
|
|
|
|
243 | (2) |
|
Deadlock Characterization |
|
|
245 | (3) |
|
Methods for Handling Deadlocks |
|
|
248 | (2) |
|
|
250 | (3) |
|
|
253 | (7) |
|
|
260 | (4) |
|
|
264 | (2) |
|
|
266 | (7) |
|
|
266 | (4) |
|
|
270 | (3) |
PART THREE STORAGE MANAGEMENT |
|
|
|
|
|
273 | (7) |
|
|
280 | (3) |
|
Contiguous Memory Allocation |
|
|
283 | (4) |
|
|
287 | (16) |
|
|
303 | (6) |
|
|
309 | (3) |
|
|
312 | (5) |
|
|
313 | (3) |
|
|
316 | (1) |
|
|
|
|
317 | (3) |
|
|
320 | (8) |
|
|
328 | (2) |
|
|
330 | (14) |
|
|
344 | (4) |
|
|
348 | (5) |
|
Operating-System Examples |
|
|
353 | (3) |
|
|
356 | (7) |
|
|
363 | (8) |
|
|
364 | (5) |
|
|
369 | (2) |
|
|
|
|
371 | (8) |
|
|
379 | (4) |
|
|
383 | (10) |
|
|
393 | (2) |
|
|
395 | (7) |
|
|
402 | (4) |
|
|
406 | (5) |
|
|
407 | (2) |
|
|
409 | (2) |
|
File-System Implementation |
|
|
|
|
411 | (2) |
|
File-System Implementation |
|
|
413 | (7) |
|
|
420 | (1) |
|
|
421 | (9) |
|
|
430 | (3) |
|
Efficiency and Performance |
|
|
433 | (4) |
|
|
437 | (2) |
|
Log-Structured File System |
|
|
439 | (2) |
|
|
441 | (7) |
|
|
448 | (7) |
|
|
449 | (2) |
|
|
451 | (4) |
PART FOUR I/O SYSTEMS |
|
|
|
|
|
455 | (1) |
|
|
456 | (10) |
|
Application I/O Interface |
|
|
466 | (6) |
|
|
472 | (6) |
|
Transforming I/O to Hardware Operations |
|
|
478 | (3) |
|
|
481 | (2) |
|
|
483 | (4) |
|
|
487 | (4) |
|
|
487 | (1) |
|
|
488 | (3) |
|
|
|
|
491 | (1) |
|
|
492 | (6) |
|
|
498 | (4) |
|
|
502 | (3) |
|
|
505 | (7) |
|
|
512 | (2) |
|
Stable-Storage Implementation |
|
|
514 | (2) |
|
Tertiary-Storage Structure |
|
|
516 | (10) |
|
|
526 | (13) |
|
|
528 | (7) |
|
|
535 | (4) |
PART FIVE DISTRIBUTED SYSTEMS |
|
|
Distributed System Structures |
|
|
|
|
539 | (7) |
|
|
546 | (2) |
|
|
548 | (3) |
|
|
551 | (7) |
|
|
558 | (4) |
|
|
562 | (2) |
|
|
564 | (2) |
|
|
566 | (2) |
|
|
568 | (5) |
|
|
569 | (2) |
|
|
571 | (2) |
|
|
|
|
573 | (2) |
|
|
575 | (4) |
|
|
579 | (4) |
|
Stateful Versus Stateless Service |
|
|
583 | (2) |
|
|
585 | (1) |
|
|
586 | (5) |
|
|
591 | (4) |
|
|
592 | (1) |
|
|
593 | (2) |
|
|
|
|
595 | (3) |
|
|
598 | (3) |
|
|
601 | (4) |
|
|
605 | (5) |
|
|
610 | (8) |
|
|
618 | (2) |
|
|
620 | (3) |
|
|
623 | (6) |
|
|
624 | (1) |
|
|
625 | (4) |
PART SIX PROTECTION AND SECURITY |
|
|
|
|
|
629 | (1) |
|
|
630 | (6) |
|
|
636 | (4) |
|
Implementation of Access Matrix |
|
|
640 | (3) |
|
Revocation of Access Rights |
|
|
643 | (2) |
|
|
645 | (3) |
|
Language-Based Protection |
|
|
648 | (6) |
|
|
654 | (3) |
|
|
655 | (1) |
|
|
656 | (1) |
|
|
|
|
657 | (2) |
|
|
659 | (4) |
|
|
663 | (3) |
|
|
666 | (5) |
|
Securing Systems and Facilities |
|
|
671 | (3) |
|
|
674 | (6) |
|
|
680 | (6) |
|
Computer-Security Classifications |
|
|
686 | (1) |
|
|
687 | (2) |
|
|
689 | (6) |
|
|
690 | (1) |
|
|
691 | (4) |
PART SEVEN CASE STUDIES |
|
|
|
|
|
695 | (5) |
|
|
700 | (3) |
|
|
703 | (4) |
|
|
707 | (4) |
|
|
711 | (5) |
|
|
716 | (8) |
|
|
724 | (5) |
|
|
729 | (3) |
|
Interporcess Communication |
|
|
732 | (2) |
|
|
734 | (3) |
|
|
737 | (2) |
|
|
739 | (4) |
|
|
740 | (1) |
|
|
741 | (2) |
|
|
|
|
743 | (1) |
|
|
744 | (2) |
|
|
746 | (17) |
|
|
763 | (3) |
|
|
766 | (8) |
|
|
774 | (6) |
|
|
780 | (7) |
|
|
787 | (2) |
|
|
787 | (1) |
|
|
788 | (1) |
|
|
|
|
789 | (7) |
|
|
796 | (1) |
|
|
797 | (1) |
|
|
798 | (1) |
|
|
799 | (1) |
|
|
800 | (1) |
|
|
800 | (1) |
|
|
801 | (2) |
|
|
803 | (1) |
|
|
804 | (3) |
Appendix A The Free BSD System (contents online) |
|
|
|
807 | (6) |
|
|
813 | (2) |
|
|
815 | (8) |
|
|
823 | (4) |
|
|
827 | (4) |
|
|
831 | (3) |
|
|
834 | (8) |
|
|
842 | (4) |
|
A.9 Interprocess Communication |
|
|
846 | (6) |
|
|
852 | (3) |
|
|
852 | (1) |
|
|
853 | (2) |
Appendix B The Mach System (contents online) |
|
|
|
855 | (2) |
|
|
857 | (1) |
|
|
858 | (4) |
|
|
862 | (6) |
|
B.5 Interporcess Communication |
|
|
868 | (6) |
|
|
874 | (6) |
|
|
880 | (1) |
|
|
881 | (7) |
|
|
882 | (1) |
|
|
883 | (2) |
|
|
885 | (3) |
Appendix C The Nachos System (contents online) |
|
|
|
888 | (2) |
|
C.2 Nachos Software Structure |
|
|
890 | (3) |
|
|
893 | (5) |
|
C.4 Obtaining a Copy of Nachos |
|
|
898 | (2) |
|
|
900 | |
|
|
901 | (1) |
|
|
902 | |
Bibliography |
|
807 | (30) |
Credits |
|
837 | (2) |
Index |
|
839 | |