... program and data User program and data Operating System Address 0xFFFFFFFF Limit Base 0 (a) User-2 data User-1 data User program Operating System Base-2 Limit-2 Limit-2 Limit-1 Base-2 Base-1 (b) Limit-1 Base-1 ... model in a distributed system. Banking system Airline reservation Operating system Web browser Compilers Editors Application programs Hardware System progr...
Ngày tải lên: 28/04/2014, 16:35
... of a global vari- able. Thread 1's code Thread 2's code Thread 1's stack Thread 2's stack Thread 1's globals Thread 2's globals Fig. 2-17. Threads can have private ... equal. Now we are engaged in a great civil war testing whether that nation, or any nation so conceived and so dedicated, can long endure. We are met on a great battlefield of t...
Ngày tải lên: 28/04/2014, 16:35
A computer system consists of hardware, system programs, and application programs figs 3
... Demonstration that the state in (a) is safe. A B C 3 2 2 9 4 7 Free: 3 (a) A B C 4 2 2 9 4 7 Free: 2 (b) A B C 4 4 —4 2 9 7 Free: 0 (c) A B C 4 — 2 9 7 Free: 4 (d) Has Max Has Max Has Max Has Max Fig. ... everything Hold and wait Request all resources initially No preemption Take resources away Circular wait Order resources numerically Fig. 3-14. Summary of approaches to deadlock...
Ngày tải lên: 28/04/2014, 16:35
A computer system consists of hardware, system programs, and application programs figs 4
... possibilities also exist. Page faults/sec Number of page frames assigned A B Fig. 4-29. Page fault rate as a function of the number of page frames assigned. Single address space 2 32 0 Data Program (a) I ... virtual page 0 Indexed by hash on virtual page Virtual page Page frame Fig. 4-15. Comparison of a traditional page table with an inverted page table. (a) Page loaded fir...
Ngày tải lên: 28/04/2014, 16:35
A computer system consists of hardware, system programs, and application programs figs 5
... 5 Parity P8 -11 P4-7 P0-3 Strip 11 Strip 7 P0-3 Fig. 5-19. RAID levels 0 through 5. Backup and parity drives are shown shaded. Spiral groove Pit Land 2K block of user data Fig. 5-20. Recording structure of a compact disc ... laser when writing 1.2 mm Dye Polycarbonate Fig. 5-22. Cross section of a CD-R disk and laser (not to scale). A silver CD-ROM has a similar structure...
Ngày tải lên: 28/04/2014, 16:35
A computer system consists of hardware, system programs, and application programs figs 6
... numbers 86 234 897 422 140 223 223 160 126 142 141 10 0110 11 0110 1100 0110 11 0111 11 0111 101 0110 11 0110 110 0110 11 0110 1110 11 111 0111 0111 0111 1 110 11010100 0111 1 000 0111 0110 1 0111 1 0111 0110 11 0111 1 110 0100 0111 0111 1 0111 0111 0111 0111 110 1111 1 0111 0111 230 162 612 342 214 160 664 216 320 180 482 42 136 210 97 41 63 21 48 262 310 516 Fig. ... 16K Disk spac...
Ngày tải lên: 28/04/2014, 16:35
A computer system consists of hardware, system programs, and application programs figs 7
... 7-12. An example of RMS and EDF real-time scheduling. A1 A1 B1 B1 A1 A2 B2 B 3A3 A4 A5 B4 A5 B1 B2 B2 Failed A2 B3 B4 0 10 20 30 40 50 60 70 80 90 100 110 120 130 140 Time (msec) A B C EDF RMS A2 A3 ... After waiting 3 min. (d) After starting to refill the buffer. (e) Buffer full. Video A A A T T Video A A A T T Video A A A T T Frame 3Frame 2Frame 1 Audio trac...
Ngày tải lên: 28/04/2014, 16:35
A computer system consists of hardware, system programs, and application programs figs 8
... 2 Run-time system Operating system Shared memory Application Hardware Run-time system Operating system Application Hardware (b) Machine 1 Machine 2 Run-time system Operating system Shared memory Application Hardware Run-time system Operating system Application Hardware (c) Machine ... memory Application Hardware Run-time system Operating system Application Hard...
Ngày tải lên: 28/04/2014, 16:35
A computer system consists of hardware, system programs, and application programs figs 9
... (b) After the procedure A has been called. (c) Buffer overflow shown in gray. (a) First page (in memory) Second page (not in memory) Page boundary A A A A A A (b) B A A A A A (c) F A A A A A Fig. ... capability. Goal Threat Data confidentiality Exposure of data Data integrity Tampering with data System availability Denial of service Fig. 9-1. Security goals and t...
Ngày tải lên: 28/04/2014, 16:35
A computer system consists of hardware, system programs, and application programs figs 10
... parent Allocate child's stack and user area Fill child's user area from parent Allocate PID for child Set up child to share parent's text Copy page tables for data and stack Set up sharing ... Description s = brk(addr) Change data segment size a = mmap(addr, len, prot, flags, fd, offset) Map a file in s = unmap(addr, len) Unmap a file Fig. 10-15. Some system calls r...
Ngày tải lên: 28/04/2014, 16:35