图书介绍
Operating System Concepts Sixth Editionpdf电子书版本下载
- Abraham Silberschatz 著
- 出版社: 高等教育出版社
- ISBN:
- 出版时间:2002
- 标注页数:890页
- 文件大小:261MB
- 文件页数:906页
- 主题词:
PDF下载
下载说明
Operating System Concepts Sixth EditionPDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
PART ONE OVERVIEW 3
Chapter 1 Introduction 3
1.1 What Is an Operating System? 3
1.2 Mainframe Systems 7
1.3 Desktop Systems 11
1.4 Multiprocessor Systems 12
1.5 Distributed Systems 14
1.6 Clustered Systems 16
1.7 Real-Time Systems 17
1.8 Handheld Systems 19
1.9 Feature Migration 20
1.10 Computing Enviromnents 21
1.11 Summary 23
Exercises 24
Bibliographical Notes 25
Chapter 2 Computer-System Structures 27
2.1 Computer-System Operation 27
2.2 I/O Structure 30
2.3 Storage Structure 34
2.4 Storage Hierarchy 38
2.5 Hardware Protection 42
2.6 Network Structure 48
2.7 Summary 51
Exercises 52
Bibliographical Notes 54
Chapter 3 Operating-System Structures 55
3.1 System Components 55
3.2 Operating-System Services 61
3.3 System Calls 63
3.4 System Programs 72
3.5 System Structure 74
3.6 Virtual Machines 80
3.7 System Design and Implementation 85
3.8 System Generation 88
3.9 Summary 89
Exercises 90
Bibliographical Notes 92
PART TWO PROCESS MANAGEMENT 95
Chapter 4 Processes 95
4.1 Process Concept 95
4.2 Process Scheduling 99
4.3 Operations on Processes 103
4.4 Cooperating Processes 107
4.5 Interprocess Communication 109
4.6 Communication in Client-ServerSystems 117
4.7 Summary 126
Exercises 127
Bibliographical Notes 128
Chapter 5 Threads 129
5.1 Overview 129
5.2 Multithreading Models 132
5.3 Threading Issues 135
5.4 Pthreads 139
5.5 Solaris 2 Threads 141
5.6 Window 2000 Threads 143
5.7 Linux Threads 144
5.8 Java Threads 145
5.9 Summary 147
Exercises 147
Bibliographical Notes 148
Chapter 6 CPU Scheduling 151
6.1 Basic Concepts 151
6.2 Scheduling Criteria 155
6.3 Scheduling Algorithms 157
6.4 Multiple-Processor Scheduling 169
6.5 Real-Time Scheduling 170
6.6 Algorithm Evaluation 172
6.7 Process Scheduling Models 177
6.8 Summary 184
Exercises 185
Bibliographical Notes 187
Chapter 7 Process Synchronization 189
7.1 Background 189
7.2 The Critical-Section Problem 191
7.3 Synchronization Hardware 197
7.4 Semaphores 201
7.5 Classic Problems of Synchronization 206
7.6 Critical Regions 211
7.7 Monitors 216
7.8 OS Synchronization 223
7.9 Atomic Transactions 225
7.10 Summary 235
Exercises 236
Bibliographical Notes 240
Chapter 8 Deadlocks 243
8.1 System Model 243
8.2 Deadlock Characterization 245
8.3 Methods for Handling Deadlocks 248
8.4 Deadlock Prevention 250
8.5 Deadlock Avoidance 253
8.6 Deadlock Detection 260
8.7 Recovery from Deadlock 264
8.8 Summary 266
Exercises 266
Bibliographical Notes 270
PART THREE STORAGE MANAGEMENT 273
Chapter 9 Memory Management 273
9.1 Background 273
9.2 Swapping 280
9.3 Contiguous Memory Allocation 283
9.4 Paging 287
9.5 Segmentation 303
9.6 Segmentation with Paging 309
9.7 Summary 312
Exercises 313
Bibliographical Notes 316
Chapter 10 Virtual Memory 317
10.1 Background 317
10.2 Demand Paging 320
10.3 Process Creation 328
10.4 Page Replacement 330
10.5 Allocation of Frames 344
10.6 Thrashing 348
10.7 Operating-System Examples 353
10.8 Other Considerations 356
10.9 Summary 363
Exercises 364
Bibliographical Notes 369
Chapter 11 File-System Interface 371
11.1 File Concept 371
11.2 Access Methods 379
11.3 Directory Structure 383
11.4 File-System Mounting 393
11.5 File Sharing 395
11.6 Protection 402
11.7 Summary 406
Exercises 407
Bibliographical Notes 409
Chapter 12 File-System Implementation 411
12.1 File-System Structure 411
12.2 File-System Implementation 413
12.3 Directory Implementation 420
12.4 Allocation Methods 421
12.5 Free-Space Management 430
12.6 Efficiency and Performance 433
12.7 Recovery 437
12.8 Log-Structured File System 439
12.9 NFS 441
12.10 Summary 448
Exercises 449
Bibliographical Notes 451
PART FOUR I/O SYSTEMS 455
Chapter 13 I/O Systems 455
13.1 Overview 455
13.2 I/O Hardware 456
13.3 Application I/O Interface 466
13.4 Kernel 1/O Subsystem 472
13.5 Transforming I/O to Hardware Operations 478
13.6 STREAMS 481
13.7 Performance 483
13.8 Summary 487
Exercises 487
Bibliographical Notes 488
Chapter 14 Mass-Storage Structure 491
14.1 Disk Structure 491
14.2 Disk Scheduling 492
14.3 Disk Management 498
14.4 Swap-Space Management 502
14.5 RAID Structure 505
14.6 Disk Attachment 512
14.7 Stable-Storage Implementation 514
14.8 Tertiary-Storage Structure 516
14.9 Summary 526
Exercises 528
Bibliographical Notes 535
PART FIVE DISTRIBUTED SYSTEMS 539
Chapter 15 Distributed System Structures 539
15.1 Background 539
15.2 Topology 546
15.3 Network Types 548
15.4 Communication 551
15.5 Communication Protocols 558
15.6 Robustness 562
15.7 Design Issues 564
15.8 An Example: Networking 566
15.9 Summary 568
Exercises 569
Bibliographical Notes 571
Chapter 16 Distributed File Systems 573
16.1 Background 573
16.2 Naming and Transparency 575
16.3 Remote File Access 579
16.4 Stateful Versus Stateless Service 583
16.5 File Replication 585
16.6 An Example: AFS 586
16.7 Summary 591
Exercises 592
Bibliographical Notes 593
Chapter 17 Distributed Coordination 595
17.1 Event Ordering 595
17.2 Mutual Exclusion 598
17.3 Atomicity 601
17.4 Concurrency Control 605
17.5 Deadlock Handling 610
17.6 Election Algorithms 618
17.7 Reaching Agreement 620
17.8 Summary 623
Exercises 624
Bibliographical Notes 625
PART SIX PROTECTION AND SECURITY 629
Chapter 18 Protection 629
18.1 Goals of Protection 629
18.2 Domain of Protection 630
18.3 Access Matrix 636
18.4 Implementation of Access Matrix 640
18.5 Revocation of Access Rights 643
18.6 Capability-Based Systems 645
18.7 Language-Based Protection 648
18.8 Summary 654
Exercises 655
Bibliographical Notes 656
Chapter 19 Security 657
19.1 The Security Problem 657
19.2 User Authentication 659
19.3 Program Threats 663
19.4 System Threats 666
19.5 Securing Systems and Facilities 671
19.6 Intrusion Detection 674
19.7 Cryptography 680
19.8 Computer-Security Classifications 686
19.9 An Example: Windows NT 687
19.10 Summary 689
Exercises 690
Bibliographical Notes 691
PART SEVEN CASE STUDIES 695
Chapter 20 The Linux System 695
20.1 History 695
20.2 Design Principles 700
20.3 Kernel Modules 703
20.4 Process Management 707
20.5 Scheduling 711
20.6 Memory Management 716
20.7 File Systems 724
20.8 Input and Output 729
20.9 Interprocess Communication 732
20.10 Network Structure 734
20.11 Security 737
20.12 Summary 739
Exercises 740
Bibliographical Notes 741
Chapter 21 Windows 2000 743
21.1 History 743
21.2 Design Principles 744
21.3 System Components 746
21.4 Environmental Subsystems 763
21.5 File System 766
21.6 Networking 774
21.7 Programmer Interface 780
21.8 Summary 787
Exercises 787
Bibliographical Notes 788
Chapter 22 Historical Perspective 789
22.1 Early Systems 789
22.2 Atlas 796
22.3 XDS-940 797
22.4 THE 798
22.5 RC 4000 799
22.6 CTSS 800
22.7 MULTICS 800
22.8 OS/360 801
22.9 Mach 803
22.10 Other Systems 804
Bibliography 807
Credits 837
Index 839