Research Catalog

Operating system concepts / Abraham Silberschatz, James L. Peterson.

Title
Operating system concepts / Abraham Silberschatz, James L. Peterson.
Author
Silberschatz, Abraham.
Publication
Reading, Mass. : Addison-Wesley, c1988.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextRequest in advance QA76.76.O63 S5583 1988Off-site

Details

Additional Authors
Peterson, James Lyle.
Description
xiii, 573 p. : ill.; 25 cm.
Series Statement
Addison-Wesley series in computer science
Uniform Title
Addison-Wesley series in computer science.
Subject
  • Operating systems (Computers)
  • Operating systems
Bibliography (note)
  • Includes bibliographical references (p. 519-554) and index.
Processing Action (note)
  • committed to retain
Contents
  • Simple Batch Systems -- Multiprogrammed Batched Systems -- Time-Sharing Systems -- Personal-Computer Systems -- Parallel Systems -- Distributed Systems -- Real-Time Systems -- Computer-System Structures -- Computer-System Operation -- I/O Structure -- Storage Structure -- Storage Hierarchy -- Hardware Protection -- General System Architecture -- Operating-System Structures -- System Components -- Operating-System Services -- System Calls -- System Programs -- System Structure -- Virtual Machines -- System Design and Implementation -- System Generation -- Process Management -- Processes -- Process Concept -- Process Scheduling -- Operation on Processes -- Cooperating Processes -- Threads -- Interprocess Communication -- CPU Scheduling -- Basic Concepts -- Scheduling Criteria -- Scheduling Algorithms -- Multiple-Processor Scheduling -- Real-Time Scheduling -- Algorithm Evaluation -- Process Synchronization -- The Critical-Section Problem -- Synchronization Hardware -- Semaphores -- Classical Problems of Synchronization -- Critical Regions -- Monitors -- Synchronization in Solaris 2 -- Atomic Transactions -- Deadlocks -- System Model -- Deadlock Characterization -- Methods for Handling Deadlocks -- Deadlock Prevention -- Deadlock Avoidance -- Deadlock Detection -- Recovery from Deadlock -- Combined Approach to Deadlock Handling -- Storage Management -- Memory Management -- Logical versus Physical Address Space -- Swapping -- Contiguous Allocation -- Paging -- Segmentation -- Segmentation with Paging.
  • Virtual Memory -- Demand Paging -- Performance of Demand Paging -- Page Replacement -- Page-Replacement Algorithms -- Allocation of Frames -- Thrashing -- Other Considerations -- Demand Segmentation -- File-System Interface -- File Concept -- Access Methods -- Directory Structure -- Protection -- Consistency Semantics -- File-System Implementation -- File-System Structure -- Allocation Methods -- Free-Space Management -- Directory Implementation -- Efficiency and Performance -- Recovery -- I/O Systems -- I/O Systems -- I/O Hardware -- Application I/O Interface -- Kernel I/O Subsystem -- Transforming I/O Requests to Hardware Operations -- Performance -- Secondary-Storage Structure -- Disk Structure -- Disk Scheduling -- Disk Management -- Swap-Space Management -- Disk Reliability -- Stable-Storage Implementation -- Tertiary-Storage Structure -- Tertiary-Storage Devices -- Operating-System Jobs -- Performance Issues -- Distributed Systems -- Network Structures -- Motivation -- Topology -- Network Types -- Communication -- Design Strategies -- Networking Example -- Distributed System Structures -- Network Operating Systems -- Distributed Operating Systems -- Remote Services -- Robustness -- Design Issues -- Distributed File Systems -- Naming and Transparency -- Remote File Access -- Stateful versus Stateless Service -- File Replication -- Example Systems -- Distributed Coordination -- Event Ordering -- Mutual Exclusion -- Atomicity -- Concurrency Control -- Deadlock Handling -- Election Algorithms.
  • Reaching Agreement -- Protection and Security -- Protection -- Goals of Protection -- Domain of Protection -- Access Matrix -- Implementation of Access Matrix -- Revocation of Access Rights -- Capability-Based Systems -- Language-Based Protection -- Security -- The Security Problem -- Authentication -- One-Time Passwords -- Program Threats -- System Threats -- Threat Monitoring -- Encryption -- Computer-Security Classifications -- An Example Security Model: Windows NT -- Summary -- The UNIX System -- History -- Design Principles -- Programmer Interface -- User Interface -- Process Management -- Memory Management -- File System -- I/O System -- Interprocess Communication -- The Linux System -- History -- Design Principles -- Kernel Modules -- Process Management -- Scheduling -- Memory Management -- File Systems -- Input and Output -- Interprocess Communication -- Network Structure -- Security -- Windows NT -- History -- Design Principles -- System Components -- Environmental Subsystems -- File System -- Networking -- Programmer Interface -- Historical Perspective -- Early Systems -- Atlas -- XDS-940 -- THE -- RC 4000 -- CTSS -- MULTICS -- OS/360 -- Mach -- Other Systems.
ISBN
0201187604
LCCN
^^^87033451^
OCLC
  • 17264304
  • SCSB-10039927
Owning Institutions
Harvard Library