did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780471365082

Applied Operating Systems Concepts

by ; ;
  • ISBN13:

    9780471365082

  • ISBN10:

    0471365084

  • Format: Hardcover
  • Copyright: 1999-08-01
  • Publisher: Wiley
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $147.70

Summary

Applied Operating System Concepts is the first book to provide a precise introduction to the principles of operating systems with numerous contemporary code examples, exercises, and programming projects. Written by the leading authors in the field of operating systems, this book capitalizes on the power of Java(TM) technology to allow students to work with executable code for examples of core concepts. Features of Applied Operating System Concepts * Presents real code examples using the Java programming language * Uses Java technology to introduce difficult concepts like processes, process synchronization, and semaphores * Describes the role of threads in modern operating systems and Java, and provides the opportunity to write multithreaded programs * Introduces up-to-date distributed operating system topics (e.g., Java's Remote Method Invocation, CORBA, RPC) in one concise chapter * Includes chapter-long case studies of UNIX, LINUX, and Windows NT(TM) * Provides a Java Primer appendix

Author Biography

<b>Abraham Silberschatz</b> is director of the Information Sciences Research Center at Bell Laboratories in Murray Hill, New Jersey. He previously held a chaired professorship in the Department of Computer Science at the University of Texas at Austin. His research interests include operating systems, database systems, and distributed systems. Professor Silberschatz is an ACM Fellow whose writings have appeared in numerous ACM and IEEE publications and other professional conferences and journals. He received the 1998 ACM Karl V. Karlstrom Outstanding Educator Award, the 1997 ACM SIGMOD Contribution Award, and the IEEE Computer Society Outstanding Paper Award for the article "Capability Manager," which appeared in IEEE Transactions and Software Engineering. He is co-author of two well-known textbooksùOperating System Concepts and Database System Concepts.<b>Peter Baer Galvin</b> is the chief technologist for Corporate Technologies of Burlington, Massachusetts, where he designs and implements complex computing facilities. Previously, he was systems manager for the department of Computer Science at Brown University. He speaks and teaches worldwide on the topics of system management, security, and performance. Mr. Galvin also writes a column on systems administration for SunWorld Magazine, and is co-author of Operating System Concepts. <b>Greg Gagne</b> has been teaching computer science at Westminster College since 1990. He has taught introductory computer science courses as well as courses on operating systems, data communications, and distributed systems. He also gives Java workshops to educators. Professor Gagnes current research includes Javaùparticularly the areas of multithreading applications and distributed computing. In addition, he has spent the past few years studying the pedagogical implications of technology as it becomes more prominent in the classroom.

Table of Contents

PART ONE OVERVIEW
Introduction
What Is an Operating System?
3(3)
Batch Systems
6(2)
Time-Sharing Systems
8(2)
Personal-Computer Systems
10(1)
Parallel Systems
11(3)
Real-Time Systems
14(1)
Distributed Systems
15(1)
Summary
16(3)
Exercises
17(1)
Bibliographical Notes
18(1)
Computer-System Structures
Computer-System Operation
19(3)
I/O Structure
22(4)
Storage Structure
26(4)
Storage Hierarchy
30(3)
Hardware Protection
33(6)
General System Architecture
39(1)
Summary
40(5)
Exercises
41(2)
Bibliographical Notes
43(2)
Operating-System Structures
System Components
45(6)
Operating-System Services
51(2)
System Calls
53(9)
System Programs
62(2)
System Structure
64(6)
Virtual Machines
70(4)
Java
74(3)
System Design and Implementation
77(3)
System Generation
80(1)
Summary
81(6)
Exercises
82(2)
Bibliographical Notes
84(3)
PART TWO PROCESS MANAGEMENT
Processes
Process Concept
87(4)
Process Scheduling
91(4)
Operations on Processes
95(4)
Cooperating Processes
99(2)
Interprocess Communication
101(11)
Summary
112(3)
Exercises
113(1)
Bibliographical Notes
114(1)
Threads
Overview
115(1)
Benefits
116(1)
User and Kernel Threads
117(1)
Multithreading Models
118(2)
Solaris 2 Threads
120(2)
Java Threads
122(8)
Summary
130(5)
Exercises
132(1)
Bibliographical Notes
133(2)
CPU Scheduling
Basic Concepts
135(4)
Scheduling Criteria
139(2)
Scheduling Algorithms
141(12)
Multiple-Processor Scheduling
153(1)
Real-Time Scheduling
153(3)
Thread Scheduling
156(2)
Java Thread Scheduling
158(4)
Algorithm Evaluation
162(5)
Summary
167(6)
Exercises
168(3)
Bibliographical Notes
171(2)
Process Synchronization
Background
173(2)
Critical-Section Problem
175(2)
Two-Tasks Solutions
177(4)
Synchronization Hardware
181(3)
Semaphores
184(7)
Classical Synchronization Problems
191(8)
Monitors
199(6)
Java Synchronization
205(15)
OS Synchronization
220(2)
Summary
222(5)
Exercises
222(3)
Bibliographical Notes
225(2)
Deadlocks
System Model
227(2)
Deadlock Characterization
229(4)
Methods for Handling Deadlocks
233(4)
Deadlock Prevention
237(4)
Deadlock Avoidance
241(3)
Deadlock Detection
244(1)
Recovery from Deadlock
245(2)
Summary
247(8)
Exercises
248(2)
Bibliographical Notes
250(5)
PART THREE STORAGE MANAGEMENT
Memory Management
Background
255(7)
Swapping
262(3)
Contiguous Memory Allocation
265(4)
Paging
269(15)
Segmentation
284(6)
Segmentation with Paging
290(2)
Summary
292(5)
Exercises
294(2)
Bibliographical Notes
296(1)
Virtual Memory
Background
297(2)
Demand Paging
299(9)
Page Replacement
308(13)
Allocation of Frames
321(4)
Thrashing
325(5)
Operating-System Examples
330(1)
Other Considerations
331(7)
Summary
338(7)
Exercises
339(5)
Bibliographical Notes
344(1)
File Systems
File Concept
345(10)
Access Methods
355(2)
Directory Structure
357(11)
Protection
368(4)
File-System Structure
372(5)
Allocation Methods
377(9)
Free-Space Management
386(2)
Directory Implementation
388(2)
Efficiency and Performance
390(2)
Recovery
392(2)
Summary
394(7)
Exercises
396(3)
Bibliographical Notes
399(2)
I/O Systems
Overview
401(1)
I/O Hardware
402(10)
Application I/O Interface
412(6)
Kernel I/O Subsystem
418(6)
I/O Requests Handling
424(3)
Performance
427(4)
Summary
431(4)
Exercises
431(2)
Bibliographical Notes
433(2)
Mass-Storage Structure
Disk Structure
435(1)
Disk Scheduling
436(6)
Disk Management
442(4)
Swap-Space Management
446(2)
Disk Reliability
448(2)
Stable-Storage Implementation
450(1)
Tertiary-Storage Structure
451(5)
Summary
456(13)
Exercises
458(6)
Bibliographical Notes
464(5)
PART FOUR DISTRIBUTED SYSTEMS
Network Structures
Background
469(8)
Network Types
477(3)
Communication
480(7)
Communication Protocols
487(3)
Robustness
490(3)
Design Issues
493(2)
Networking Example
495(2)
Summary
497(4)
Exercises
498(2)
Bibliographical Notes
500(1)
Distributed Communication
Sockets
501(5)
Remote Procedure Calls
506(1)
Remote Method Invocation
507(8)
CORBA
515(1)
Object Registration
516(1)
Summary
517(4)
Exercises
518(1)
Bibliographical Notes
519(2)
Distributed Coordination
Event Ordering
521(3)
Mutual Exclusion
524(3)
Deadlock Handling
527(8)
Election Algorithms
535(3)
Summary
538(3)
Exercises
538(1)
Bibliographical Notes
539(2)
Distributed File Systems
Background
541(2)
Naming and Transparency
543(4)
Remote File Access
547(4)
Stateful Versus Stateless Service
551(2)
File Replication
553(1)
Example System: NFS
554(7)
Summary
561(6)
Exercises
562(1)
Bibliographical Notes
563(4)
PART FIVE PROTECTION AND SECURITY
Protection
Goals of Protection
567(2)
Domain of Protection
569(5)
Access Matrix
574(4)
Implementation of Access Matrix
578(4)
Revocation of Access Rights
582(2)
Language-Based Protection
584(3)
Summary
587(4)
Exercises
588(1)
Bibliographical Notes
589(2)
Security
The Security Problem
591(2)
Authentication
593(4)
Program Threats
597(1)
System Threats
598(5)
Threat Monitoring
603(2)
Encryption
605(2)
Computer-Security Classifications
607(2)
An Example Security Model: Windows NT
609(2)
Java Security
611(4)
Summary
615(6)
Exercises
615(1)
Bibliographical Notes
616(5)
PART SIX CASE STUDIES
The UNIX System
History
621(2)
Design Principles
623(3)
Programmer Interface
626(8)
User Interface
634(4)
Process Management
638(4)
Memory Management
642(4)
File System
646(8)
I/O System
654(4)
Interprocess Communication
658(6)
Summary
664(5)
Exercises
665(1)
Bibliographical Notes
666(3)
The Linux System
History
669(5)
Design Principles
674(3)
Kernel Modules
677(4)
Process Management
681(4)
Scheduling
685(5)
Memory Management
690(8)
File Systems
698(5)
Input and Output
703(3)
Interprocess Communication
706(2)
Network Structure
708(3)
Security
711(2)
Summary
713(4)
Exercises
714(1)
Bibliographical Notes
715(2)
Windows NT
History
717(1)
Design Principles
718(1)
System Components
719(6)
Executive
725(10)
Environmental Subsystems
735(3)
File System
738(7)
Networking
745(6)
Programmer Interface
751(7)
Summary
758(3)
Exercises
759(1)
Bibliographical Notes
759(2)
Appendix A Java Primer
A.1 Basics
761(9)
A.2 Exception Handling
770(2)
A.3 Inheritance
772(3)
A.4 Interfaces and Abstract Classes
775(4)
A.5 Applications and Applets
779(2)
A.6 Summary
781(2)
Bibliographical Notes
781(2)
Bibliography 783(24)
Credits 807(2)
Index 809

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program