did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780534376666

Understanding Operating Systems

by
  • ISBN13:

    9780534376666

  • ISBN10:

    0534376665

  • Format: Paperback
  • Copyright: 2000-11-22
  • Publisher: Course Technology
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $271.95

Summary

This fourth edition blends operating systems theory and practice in a well-organized way. Its innovative two-part approach explores operating systems theory and development in the first section, and discusses the four most widely-used operating systems (MS-DOS, Windows, Linux, and UNIX) in the second. Each chapter has been updated for currency, and a brand-new chapter on System Security has been added.

Table of Contents

Part One OPERATING SYSTEMS THEORY 1(278)
Overview
2(16)
Introduction
2(1)
Operating System Software
3(3)
Machine Hardware
6(2)
Types of Operating Systems
8(1)
Brief History of Operating Systems Development
9(6)
1940s
10(1)
1950s
10(2)
1960s
12(1)
1970s
13(1)
1980s
14(1)
1990s
15(1)
Conclusion
15(1)
Key Terms
16(1)
Exercises
16(2)
Memory Management, Early Systems
18(27)
Single-User Contiguous Scheme
19(1)
Fixed Partitions
20(2)
Dynamic Partitions
22(2)
Best-Fit versus First-Fit Allocation
24(5)
Deallocation
29(4)
Joining Two Free Blocks
30(1)
Joining Three Free Blocks
31(1)
Deallocating an Isolated Block
31(2)
Relocatable Dynamic Partitions
33(5)
Conclusion
38(1)
Key Terms
39(1)
Exercises
39(6)
Memory Management, Recent Systems
45(32)
Paged Memory Allocation
46(6)
Demand Paging
52(5)
Page Replacement Policies and Concepts
57(7)
First-In, First-Out
57(2)
Least Recently Used
59(1)
The Mechanics of Paging
60(2)
The Working Set
62(2)
Segmented Memory Allocation
64(3)
Segmented/Demand Paged Memory Allocation
67(2)
Virtual Memory
69(2)
Conclusion
71(2)
Key Terms
73(1)
Exercises
73(4)
Processor Management
77(26)
Job Scheduling Versus Process Scheduling
79(1)
Process Scheduler
80(5)
Job and Process Status
81(1)
Process Control Blocks
82(2)
PCBs and Queuing
84(1)
Process Scheduling Policies
85(1)
Process Scheduling Algorithms
86(10)
First-Come, First-Served
86(2)
Shortest Job Next
88(1)
Priority Scheduling
89(1)
Shortest Remaining Time
90(2)
Round Robin
92(2)
Multiple-Level Queues
94(2)
Cache Memory
96(1)
A Word about Interrupts
97(1)
Conclusion
98(1)
Key Terms
99(1)
Exercises
100(3)
Process Management
103(26)
Deadlock
104(18)
Seven Cases of Deadlock
104(7)
Conditions for Deadlock
111(1)
Modeling Deadlocks
112(3)
Strategies for Handling Deadlocks
115(7)
Starvation
122(2)
Conclusion
124(1)
Key Terms
124(1)
Exercises
125(4)
Concurrent Processes
129(21)
What Is Parallel Processing?
130(1)
Typical Multiprocessing Configurations
131(3)
Master/Slave Configuration
131(1)
Loosely Coupled Configuration
132(1)
Symmetric Configuration
133(1)
Process Synchronization Software
134(4)
Test-and-Set
135(1)
WAIT and SIGNAL
136(1)
Semaphores
136(2)
Process Cooperation
138(3)
Producers and Consumers
138(2)
Readers and Writers
140(1)
Concurrent Programming
141(5)
Applications of Concurrent Programming
142(2)
Ada
144(2)
Conclusion
146(1)
Key Terms
147(1)
Exercises
147(3)
Device Management
150(31)
System Devices
151(1)
Sequential Access Storage Media
151(3)
Direct Access Storage Devices
154(8)
Fixed-Head DASDs
155(1)
Movable-Head DASDs
155(2)
Optical Disc Storage
157(2)
Access Time Required
159(3)
Components of the I/O Subsystem
162(3)
Communication among Devices
165(3)
Management of I/O Requests
168(6)
Device Handler Seek Strategies
169(3)
Search Strategies: Rotational Ordering
172(2)
RAID
174(2)
Conclusion
176(1)
Key Terms
177(1)
Exercises
178(3)
File Management
181(27)
The File Manager
181(2)
Responsibilities of the File Manager
182(1)
Definitions
183(1)
Interacting with the File Manager
183(6)
Typical Volume Configuration
184(1)
About Subdirectories
185(2)
File-Naming Conventions
187(2)
File Organization
189(3)
Record Format
189(1)
Physical File Organization
190(2)
Physical Storage Allocation
192(5)
Contiguous Storage
192(2)
Noncontiguous Storage
194(1)
Indexed Storage
195(2)
Data Compression
197(1)
Access Methods
197(3)
Sequential Access
198(1)
Direct Access
199(1)
Levels in a File Management System
200(2)
Access Control Verification Module
202(3)
Access Control Matrix
202(1)
Access Control Lists
203(1)
Capability Lists
204(1)
Lockwords
204(1)
Conclusion
205(1)
Key Terms
205(1)
Exercises
206(2)
Network Organization Concepts
208(27)
Basic Terminology
209(1)
Network Topologies
210(6)
Star
211(1)
Ring
212(1)
Bus
213(1)
Tree
214(1)
Hybrid
215(1)
Network Types
216(1)
Local Area Network
216(1)
Metropolitan Area Network
216(1)
Wide Area Network
217(1)
Software Design Issues
217(9)
Addressing Conventions
217(1)
Routing Strategies
218(2)
Connection Models
220(3)
Conflict Resolution
223(3)
Transport Protocol Standards
226(6)
OSI Reference Model
227(3)
TCP/IP Model
230(2)
Conclusion
232(1)
Key Terms
232(1)
Exercises
232(3)
Management of Network Functions
235(23)
History
236(1)
Comparison of Network and Distributed Operating Systems
236(3)
DO/S Development
239(13)
Memory Management
239(1)
Process Management
240(5)
Device Management
245(2)
File Management
247(3)
Network Management
250(2)
NOS Development
252(3)
Important NOS Features
253(1)
Major NOS Functions
254(1)
Conclusion
255(1)
Key Terms
256(1)
Exercises
256(2)
System Management
258(21)
Evaluating an Operating System
258(1)
The Operating System's Components
259(3)
System Security
262(8)
Levels of Protection
262(1)
Managing Systems
263(2)
Security Breaches
265(1)
System Assaults: Computer Viruses
266(2)
Network and Internet Assaults
268(1)
Ethics
268(2)
Measuring System Performance
270(4)
Measurement Tools
270(3)
Feedback Loops
273(1)
Monitoring
274(1)
Accounting
274(2)
Conclusion
276(1)
Key Terms
276(1)
Exercises
277(2)
Part Two OPERATING SYSTEMS IN PRACTICE 279(136)
MS-DOS Operating System
281(21)
History
282(1)
Design Goals
282(3)
Memory Management
285(3)
Main Memory Allocation
286(1)
Memory Block Allocation
287(1)
Processor Management
288(2)
Process Management
288(1)
Interrupt Handlers
289(1)
Device Management
290(1)
File Management
291(5)
File Name Conventions
292(1)
Managing Files
293(3)
User Interface
296(5)
Batch Files
297(1)
Redirection
298(1)
Filters
298(1)
Pipes
299(1)
Additional Commands
299(2)
Conclusion
301(1)
Windows 2000 Operating System
302(31)
History
302(3)
Design Goals
305(3)
Extensibility
305(1)
Portability
306(1)
Reliability
306(1)
Compatibility
307(1)
Performance
308(1)
Memory Management
308(3)
User-Mode Features
308(1)
Virtual Memory Implementation
309(2)
Processor Management
311(3)
Device Management
314(6)
File Management
320(3)
Network Management
323(2)
Microsoft Networks
323(2)
Directory Services
325(1)
Security Management
325(3)
Overview
326(1)
Security Terminology
327(1)
User Interface
328(4)
Conclusion
332(1)
UNIX Operating System
333(33)
History
334(3)
UNIX System V
336(1)
A Word about Linux
336(1)
Design Goals
337(1)
A Word about Linux
338(1)
Memory Management
338(3)
A Word about Linux
341(1)
Processor Management
341(7)
Process Table versus User Table
342(2)
Synchronization
344(1)
fork, wait, and exec
344(2)
A Word about Linux
346(2)
Device Management
348(2)
Device Drivers
348(1)
Device Classifications
348(2)
A Word about Linux
350(1)
File Management
350(7)
File Names
352(1)
File Directories
353(1)
Data Structures for Accessing Files
354(2)
A Word about Linux
356(1)
User Interface
357(8)
A Word about Linux
364(1)
Conclusion
365(1)
OpenVMS Alpha Operating System
366(21)
History
367(2)
Design Goals
369(1)
Memory Management
370(3)
The Pager
371(1)
The Swapper
372(1)
Processor Management
373(3)
Process Scheduler
373(3)
The Rescheduler
376(1)
Device Management
376(2)
File Management
378(3)
User Interface
381(5)
Command Procedure Files
382(1)
Redirection
382(2)
Additional Commands
384(2)
Conclusion
386(1)
OS/390 Operating System
387(28)
History
388(2)
Design Goals
390(1)
Memory Management
391(7)
Virtual Storage Management
393(4)
Organization of Storage
397(1)
Processor Management
398(2)
Task Management
399(1)
Program Management
400(1)
Device Management
400(3)
DASD Space Management
400(1)
I/O Supervisor
401(2)
IOS Driver
403(1)
Virtual I/O
403(1)
File Management
403(6)
Catalog Management
404(1)
I/O Support
405(1)
Access Methods
405(3)
Space Allocation
408(1)
Security Management
409(1)
User Interface
409(4)
JCL Introduction
410(1)
Examples
411(2)
Conclusion
413(2)
Appendix A Command Translation Table 415(2)
Appendix B Guide to IBM Acronyms 417(2)
Appendix C Guide to Microsoft Acronyms 419(2)
Appendix D Guide to Graphical User Interfaces 421(4)
Appendix E ACM Code of Ethics and Professional Conduct 425(4)
Glossary 429(26)
Bibliography 455(4)
Index 459

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program