Research Catalog
Operating system concepts / Abraham Silberschatz, James L. Peterson.
- Title
- Operating system concepts / Abraham Silberschatz, James L. Peterson.
- Author
- Silberschatz, Abraham.
- Publication
- Reading, Mass. : Addison-Wesley, c1988.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Request in advance | QA76.76.O63 S5583 1988 | Off-site |
Details
- Additional Authors
- Peterson, James Lyle.
- Description
- xiii, 573 p. : ill.; 25 cm.
- Series Statement
- Addison-Wesley series in computer science
- Uniform Title
- Addison-Wesley series in computer science.
- Subject
- Bibliography (note)
- Includes bibliographical references (p. 519-554) and index.
- Processing Action (note)
- committed to retain
- Contents
- Simple Batch Systems -- Multiprogrammed Batched Systems -- Time-Sharing Systems -- Personal-Computer Systems -- Parallel Systems -- Distributed Systems -- Real-Time Systems -- Computer-System Structures -- Computer-System Operation -- I/O Structure -- Storage Structure -- Storage Hierarchy -- Hardware Protection -- General System Architecture -- Operating-System Structures -- System Components -- Operating-System Services -- System Calls -- System Programs -- System Structure -- Virtual Machines -- System Design and Implementation -- System Generation -- Process Management -- Processes -- Process Concept -- Process Scheduling -- Operation on Processes -- Cooperating Processes -- Threads -- Interprocess Communication -- CPU Scheduling -- Basic Concepts -- Scheduling Criteria -- Scheduling Algorithms -- Multiple-Processor Scheduling -- Real-Time Scheduling -- Algorithm Evaluation -- Process Synchronization -- The Critical-Section Problem -- Synchronization Hardware -- Semaphores -- Classical Problems of Synchronization -- Critical Regions -- Monitors -- Synchronization in Solaris 2 -- Atomic Transactions -- Deadlocks -- System Model -- Deadlock Characterization -- Methods for Handling Deadlocks -- Deadlock Prevention -- Deadlock Avoidance -- Deadlock Detection -- Recovery from Deadlock -- Combined Approach to Deadlock Handling -- Storage Management -- Memory Management -- Logical versus Physical Address Space -- Swapping -- Contiguous Allocation -- Paging -- Segmentation -- Segmentation with Paging.
- Virtual Memory -- Demand Paging -- Performance of Demand Paging -- Page Replacement -- Page-Replacement Algorithms -- Allocation of Frames -- Thrashing -- Other Considerations -- Demand Segmentation -- File-System Interface -- File Concept -- Access Methods -- Directory Structure -- Protection -- Consistency Semantics -- File-System Implementation -- File-System Structure -- Allocation Methods -- Free-Space Management -- Directory Implementation -- Efficiency and Performance -- Recovery -- I/O Systems -- I/O Systems -- I/O Hardware -- Application I/O Interface -- Kernel I/O Subsystem -- Transforming I/O Requests to Hardware Operations -- Performance -- Secondary-Storage Structure -- Disk Structure -- Disk Scheduling -- Disk Management -- Swap-Space Management -- Disk Reliability -- Stable-Storage Implementation -- Tertiary-Storage Structure -- Tertiary-Storage Devices -- Operating-System Jobs -- Performance Issues -- Distributed Systems -- Network Structures -- Motivation -- Topology -- Network Types -- Communication -- Design Strategies -- Networking Example -- Distributed System Structures -- Network Operating Systems -- Distributed Operating Systems -- Remote Services -- Robustness -- Design Issues -- Distributed File Systems -- Naming and Transparency -- Remote File Access -- Stateful versus Stateless Service -- File Replication -- Example Systems -- Distributed Coordination -- Event Ordering -- Mutual Exclusion -- Atomicity -- Concurrency Control -- Deadlock Handling -- Election Algorithms.
- Reaching Agreement -- Protection and Security -- Protection -- Goals of Protection -- Domain of Protection -- Access Matrix -- Implementation of Access Matrix -- Revocation of Access Rights -- Capability-Based Systems -- Language-Based Protection -- Security -- The Security Problem -- Authentication -- One-Time Passwords -- Program Threats -- System Threats -- Threat Monitoring -- Encryption -- Computer-Security Classifications -- An Example Security Model: Windows NT -- Summary -- The UNIX System -- History -- Design Principles -- Programmer Interface -- User Interface -- Process Management -- Memory Management -- File System -- I/O System -- Interprocess Communication -- The Linux System -- History -- Design Principles -- Kernel Modules -- Process Management -- Scheduling -- Memory Management -- File Systems -- Input and Output -- Interprocess Communication -- Network Structure -- Security -- Windows NT -- History -- Design Principles -- System Components -- Environmental Subsystems -- File System -- Networking -- Programmer Interface -- Historical Perspective -- Early Systems -- Atlas -- XDS-940 -- THE -- RC 4000 -- CTSS -- MULTICS -- OS/360 -- Mach -- Other Systems.
- ISBN
- 0201187604
- LCCN
- ^^^87033451^
- OCLC
- 17264304
- SCSB-10039927
- Owning Institutions
- Harvard Library