Date: Tue, 05 Nov 1996 20:57:09 GMT Server: NCSA/1.5 Content-type: text/html Last-modified: Thu, 31 Oct 1996 21:38:52 GMT Content-length: 11952 CS 537 - Introduction

CS 537
Lecture Notes
Introduction


Contents


History

What is an OS For?

Beautification Principle
The goal of an OS is to make hardware look better than it is.
Resource principle

Bottom-up View (starting with the hardware)

Hardware (summary; more details later)

Timing problem

Space problem

Top-Down View (what does it look like to various kinds of users?)

Course Outline

  1. Processes.
    • What processes are.
    • Using processes
      • synchronization and communication
        • semaphores, critical regions, monitors, conditions,
        • messages, pipes
      • process structures
        • pipelines, producer/consumer, remote procedure call
      • deadlock
    • Implementing processes
      • mechanism
        • critical sections
        • process control block
        • process swap
        • semaphores, monitors
      • policy (short-term scheduling)
        • fcfs, round-robin, shortest-job next, multilevel queues
  2. Memory
    • Main-memory allocation
    • Swapping, overlays
    • Stack allocation (implementation of programming languages)
    • Virtual memory hardware
      • paging, segmentation, translation lookaside buffer
    • policy
      • page-replacement algorithms
        • random, fifo, lru, clock, working set
  3. I/O devices
    • device drivers, interrupt handlers
    • disks
      • hardware characteristics
      • disk scheduling
        • elevator algorithm
  4. File systems
    • file naming
    • file structure (user's view)
      • flat (array of bytes)
      • record-structured
      • indexed
      • random-access
      • metadata
      • mapped files
    • implementation
      • structure
        • linked, tree-structured, B-tree
      • inodes
      • directories
      • free-space management
  5. Protection and security
    • threats
    • access policy
      • capabilities, access-control lists
    • implementation
      • authentication/determination/enforcement
      • encryption
        • conventional
        • public-key
        • digital signatures

solomon@cs.wisc.edu
Thu Oct 31 15:38:51 CST 1996

Copyright © 1996 by Marvin Solomon. All rights reserved.