did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780534423667

Understanding Operating Systems

by
  • ISBN13:

    9780534423667

  • ISBN10:

    0534423663

  • Edition: 4th
  • Format: Hardcover
  • Copyright: 2005-03-08
  • Publisher: Cengage Learning
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $271.95

Summary

This fourth edition blends operating systems theory and practice in a well-organized way. Its innovative two-part approach explores operating systems theory and development in the first section, and discusses the four most widely-used operating systems (MS-DOS, Windows, Linux, and UNIX) in the second. Each chapter has been updated for currency, and a brand-new chapter on System Security has been added.

Table of Contents

Part One Operating Systems Theory
1(396)
Introducing Operating Systems
3(28)
What is an Operating System?
4(1)
Operating System Software
4(4)
Machine Hardware
8(3)
Types of Operating Systems
11(2)
Brief History of Operating Systems Development
13(9)
1940s
13(2)
1950s
15(2)
1960s
17(1)
1970s
18(1)
1980s
19(1)
1990s
20(2)
Current Operating Systems
22(4)
System Architecture
22(1)
Threads
23(1)
Multiprocessing Configurations
24(2)
Conclusion
26(1)
Key Terms
26(2)
Exercises
28(3)
Memory Management: Early Systems
31(32)
Single-User Contiguous Scheme
32(2)
Fixed Partitions
34(2)
Dynamic Partitions
36(2)
Best-Fit Versus First-Fit Allocation
38(6)
Deallocation
44(1)
Case 1: Joining Two Free Blocks
45(1)
Case 2: Joining Three Free Blocks
46(1)
Case 3: Deallocating an Isolated Block
47(1)
Relocatable Dynamic Partitions
48(6)
Conclusion
54(1)
Key Terms
54(2)
Exercises
56(7)
Memory Management: Virtual Memory
63(48)
Paged Memory Allocation
64(7)
Demand Paging
71(5)
Page Replacement Policies and Concepts
76(10)
First-In First-Out
77(2)
Least Recently Used
79(5)
The Mechanics of Paging
84(1)
The Working Set
84(2)
Segmented Memory Allocation
86(3)
Segmented/Demand Paged Memory Allocation
89(3)
Virtual Memory
92(2)
Cache Memory
94(5)
Case Study: Memory Management in Linux
99(2)
Conclusion
101(1)
Key Terms
102(2)
Exercises
104(7)
Processor Management
111(30)
Overview
112(2)
Job Scheduling Versus Process Scheduling
114(1)
Process Scheduler
114(6)
Job and Process Status
116(1)
Process Control Blocks
117(2)
PCBs and Queueing
119(1)
Process Scheduling Policies
120(1)
Process Scheduling Algorithms
121(12)
First-Come, First-Served
122(2)
Shortest Job Next
124(1)
Priority Scheduling
125(1)
Shortest Remaining Time
126(2)
Round Robin
128(2)
Multiple-Level Queues
130(3)
A Word About Interrupts
133(1)
Conclusion
134(1)
Key Terms
135(2)
Exercises
137(4)
Process Management
141(32)
Deadlock
142(2)
Seven Cases of Deadlock
144(6)
Conditions for Deadlock
150(1)
Modeling Deadlocks
151(4)
Strategies for Handling Deadlocks
155(8)
Starvation
163(2)
Conclusion
165(1)
Key Terms
166(1)
Exercises
167(6)
Concurrent Processes
173(30)
What is Parallel Processing?
174(2)
Typical Multiprocessing Configurations
176(2)
Master/Slave Configuration
176(1)
Loosely Coupled Configuration
177(1)
Symmetric Configuration
177(1)
Process Synchronization Software
178(3)
Test-and-Set
180(1)
Wait and Signal
180(1)
Semaphores
181(1)
Process Cooperation
181(6)
Producers and Consumers
183(3)
Readers and Writers
186(1)
Concurrent Programming
187(3)
Applications of Concurrent Programming
187(3)
Threads and Concurrent Programming
190(7)
Thread States
191(2)
Thread Control Block
193(1)
Concurrent Programming Languages
194(1)
Ada
194(1)
Java
195(2)
Case Study: Process Management in Linux
197(1)
Conclusion
198(1)
Key Terms
199(1)
Exercises
200(3)
Device Management
203(48)
Types of Devices
204(1)
Sequential Access Storage Media
205(3)
Direct Access Storage Devices
208(9)
Fixed-Head Magnetic Disk Storage
209(1)
Movable-Head Magnetic Disk Storage
209(2)
Optical Disc Storage
211(5)
Magneto-Optical Storage
216(1)
Flash Memory Storage
216(1)
DASD Access Times
217(3)
Fixed-Head Devices
217(1)
Movable-Head Devices
218(2)
Components of the I/O Subsystem
220(3)
Communication Among Devices
223(3)
Management of I/O Requests
226(7)
Device Handler Seek Strategies
227(4)
Search Strategies: Rotational Ordering
231(2)
Raid
233(6)
Case Study: Linux Device Management
239(2)
Device Classes
239(1)
open and release
240(1)
Conclusion
241(2)
Key Terms
243(3)
Exercises
246(5)
File Management
251(34)
The File Manager
252(2)
Responsibilities of the File Manager
252(1)
Definitions
253(1)
Interacting with the File Manager
254(7)
Typical Volume Configuration
255(1)
About Subdirectories
256(2)
File Naming Conventions
258(3)
File Organization
261(4)
Record Format
261(1)
Physical File Organization
262(3)
Physical Storage Allocation
265(5)
Contiguous Storage
266(1)
Noncontiguous Storage
267(2)
Indexed Storage
269(1)
Access Methods
270(2)
Sequential Access
270(1)
Direct Access
271(1)
Levels in a File Management System
272(2)
Access Control Verification Module
274(3)
Access Control Matrix
275(1)
Access Control Lists
275(1)
Capability Lists
276(1)
Lockwords
277(1)
Data Compression
277(1)
Case Study: File Management in Linux
278(2)
File Names
279(1)
File Directories
279(1)
Data Structures
280(1)
Conclusion
280(1)
Key Terms
281(2)
Exercises
283(2)
Network Organization Concepts
285(34)
Basic Terminology
286(2)
Network Topologies
288(6)
Star
289(1)
Ring
289(2)
Bus
291(1)
Tree
292(1)
Hybrid
293(1)
Network Types
294(3)
Local Area Network
294(1)
Metropolitan Area Network
295(1)
Wide Area Network
295(1)
Wireless Local Area Network
295(2)
Software Design Issues
297(10)
Addressing Conventions
297(1)
Routing Strategies
298(2)
Connection Models
300(3)
Conflict Resolution
303(4)
Transport Protocol Standards
307(6)
OSI Reference Model
307(4)
TCP/IP Model
311(2)
Conclusion
313(1)
Key Terms
313(2)
Exercises
315(4)
Management of Network Functions
319(26)
History of Networks
320(3)
Comparison of Network Distributed Operating Systems
320(3)
DO/S Development
323(15)
Memory Management
323(2)
Process Management
325(5)
Device Management
330(2)
File Management
332(4)
Network Management
336(2)
NOS Development
338(3)
Important NOS Features
339(1)
Major NOS Functions
340(1)
Conclusion
341(1)
Key Terms
342(1)
Exercises
343(2)
Security and Ethics
345(28)
Role of the Operating System in Security
345(3)
System Survivability
346(1)
Levels of Protection
346(1)
Backup and Recovery
347(1)
Security Breaches
348(8)
Unintentional Intrusions
349(1)
Intentional Attacks
349(7)
System Protection
356(7)
Antivirus Software
356(2)
Firewalls
358(1)
Authentication
359(2)
Encryption
361(2)
Password Management
363(4)
Password Construction
363(2)
Password Alternatives
365(1)
Social Engineering
366(1)
Ethics
367(1)
Conclusion
368(1)
Key Terms
369(2)
Exercises
371(2)
System Management
373(24)
Evaluating an Operating System
374(1)
Cooperation Among Components
374(6)
Role of Memory Management
375(1)
Role of Processor Management
375(1)
Role of Device Management
376(1)
Role of File Management
377(2)
Role of Network Management
379(1)
Measuring System Performance
380(7)
Measurement Tools
380(3)
Feedback Loops
383(2)
Monitoring
385(2)
Accounting
387(2)
Patch Management
389(3)
Patching Fundamentals
390(2)
Software Options
392(1)
Timing and the Patch Cycle
392(1)
Conclusion
392(1)
Key Terms
393(1)
Exercises
394(3)
Part Two Operating Systems in Practice
397(116)
MS-DOS Operating System
399(26)
History
400(2)
Design Goals
402(2)
Memory Management
404(4)
Main Memory Allocation
406(1)
Memory Block Allocation
407(1)
Processor Management
408(2)
Process Management
408(1)
Interrupt Handlers
409(1)
Device Management
410(1)
File Management
411(5)
Filename Conventions
411(1)
Managing Files
412(4)
User Interface
416(7)
Batch Files
417(1)
Redirection
418(1)
Filters
419(1)
Pipes
420(1)
Additional Commands
421(2)
Conclusion
423(1)
Key Terms
423(2)
Windows Operating Systems
425(36)
Windows Development
426(3)
Early Windows Products
426(1)
Operating Systems for Single Users
427(1)
Operating Systems for Networks
428(1)
Design Goals
429(3)
Extensibility
429(1)
Portability
430(1)
Reliability
431(1)
Compatibility
431(1)
Performance
432(1)
Memory Management
432(4)
User-Model Features
433(1)
Virtual Memory Implementation
434(2)
Processor Management
436(2)
Device Management
438(4)
File Management
442(4)
Network Management
446(2)
MS-Net
446(1)
Directory Services
447(1)
Security Management
448(3)
Security Basics
448(1)
Security Terminology
449(2)
User Interface
451(6)
Conclusion
457(1)
Key Terms
457(4)
UNIX and Linux Operating Systems
461(52)
Overview
462(1)
History
462(5)
The Evolution of UNIX
463(2)
The Evolution of Linux
465(2)
Design Goals
467(2)
Memory Management
469(3)
UNIX Memory Management
469(2)
Linux Memory Management
471(1)
Processor Management
472(6)
Process Table Versus User Table
473(1)
Synchronization
474(1)
fork, wait, and exec
474(3)
Linux Process Management
477(1)
Device Management
478(3)
Device Classifications
479(1)
Device Drivers
480(1)
Filenames Management
481(13)
Filenames in UNIX and Linux
482(1)
Directories in UNIX and Linux
483(2)
Data Structures in UNIX
485(2)
Data Structures in Linux
487(1)
User Interface
487(1)
Script Files
488(1)
Redirection
489(1)
Pipes
490(1)
Filters
491(1)
Additional Commands
492(2)
Conclusion
494(1)
Key Terms
495(2)
Appendixes
Appendix A Command Translation Table
497(2)
Appendix B Guide to Microsoft Acronyms
499(2)
Appendix C Guide to Graphical User Interfaces
501(2)
Appendix D ACM Code of Ethics and Professional Conduct
503(4)
Appendix E Innovators
507(2)
Appendix F Timeline of Operating System Releases
509(4)
Glossary 513(30)
Bibliography 543(6)
Index 549

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program