The document discusses key concepts related to kernel architecture, processes, and file handling in operating systems. It covers topics such as inodes, process tables, file descriptors, context switching, fork system calls, and the interaction between inodes, file tables, and process file descriptor tables when files are opened. The main components of a file system like boot blocks, super blocks, inode lists, and data blocks are also summarized.
Introduction to users and groups in Linux. We will explore how to set user expiry information and force user password change after certain period of time. We will be also providing different permission to users and groups and restricting users and groups operations using sudoers file
Introduction to users and groups in Linux. We will explore how to set user expiry information and force user password change after certain period of time. We will be also providing different permission to users and groups and restricting users and groups operations using sudoers file
Basic Memory Management
Introduction
Logical and Physical address map
Memory allocation
Contiguous Memory allocation
Fixed and variable partition
Internal and External fragmentation and Compaction
Paging
Principle of operation
Page allocation
Hardware support for paging
Protection and sharing
Disadvantages of paging
Virtual Memory
Basics of Virtual Memory
Hardware and control structures
Locality of reference
Page fault
Working Set
Dirty page/Dirty bit
Demand paging
Page Replacement policies
Optimal (OPT)
First in First Out (FIFO)
Second Chance (SC)
Not recently used (NRU)
Least Recently used (LRU)
The Anatomy Of The Google Architecture Fina Lv1.1Hassy Veldstra
A comprehensive overview of Google's architecture - starting from the search page and all the way to its internal networks.
By Ed Austin, talk given at Edinburgh Techmeetup in December 2009
http://techmeetup.co.uk
This lecture discusses the concept of Multi-User support in Linux. It discusses how Linux protects user files and resources from other user unauthorized access. It also shows how to share resources and files among users, how to add/del users and groups.
Check the other Lectures and courses in
http://Linux4EnbeddedSystems.com
or Follow our Facebook Group at
- Facebook: @LinuxforEmbeddedSystems
Lecturer Profile:
- https://www.linkedin.com/in/ahmedelarabawy
Basic Memory Management
Introduction
Logical and Physical address map
Memory allocation
Contiguous Memory allocation
Fixed and variable partition
Internal and External fragmentation and Compaction
Paging
Principle of operation
Page allocation
Hardware support for paging
Protection and sharing
Disadvantages of paging
Virtual Memory
Basics of Virtual Memory
Hardware and control structures
Locality of reference
Page fault
Working Set
Dirty page/Dirty bit
Demand paging
Page Replacement policies
Optimal (OPT)
First in First Out (FIFO)
Second Chance (SC)
Not recently used (NRU)
Least Recently used (LRU)
The Anatomy Of The Google Architecture Fina Lv1.1Hassy Veldstra
A comprehensive overview of Google's architecture - starting from the search page and all the way to its internal networks.
By Ed Austin, talk given at Edinburgh Techmeetup in December 2009
http://techmeetup.co.uk
This lecture discusses the concept of Multi-User support in Linux. It discusses how Linux protects user files and resources from other user unauthorized access. It also shows how to share resources and files among users, how to add/del users and groups.
Check the other Lectures and courses in
http://Linux4EnbeddedSystems.com
or Follow our Facebook Group at
- Facebook: @LinuxforEmbeddedSystems
Lecturer Profile:
- https://www.linkedin.com/in/ahmedelarabawy
OS Internals and Portable Executable File FormatAitezaz Mohsin
Low level security weaknesses are based on the core knowledge and base knowledge of operating system. People ignore to learn low level basics that would show them how to find those issues. As a reverse engineer you must understand the internal working of operating system that you are targeting.
Course 102: Lecture 27: FileSystems in Linux (Part 2)Ahmed El-Arabawy
This lecture goes through the different types of Filesystems and some commands that are used with filesystems. It introduces the filesystems ext2/3/4 , JFFS2, cramfs, ramfs, tmpfs, and NFS.
Video for this lecture on youtube:
http://www.youtube.com/watch?v=XPtPsc6uaKY
Check the other Lectures and courses in
http://Linux4EnbeddedSystems.com
or Follow our Facebook Group at
- Facebook: @LinuxforEmbeddedSystems
Lecturer Profile:
Ahmed ElArabawy
- https://www.linkedin.com/in/ahmedelarabawy
Course 102: Lecture 26: FileSystems in Linux (Part 1) Ahmed El-Arabawy
This lecture introduces some concepts about FileSystems in Linux.
Video for this lecture on youtube:
http://www.youtube.com/watch?v=9jj1QOokACo
Check the other Lectures and courses in
http://Linux4EnbeddedSystems.com
or Follow our Facebook Group at
- Facebook: @LinuxforEmbeddedSystems
Lecturer Profile:
Ahmed ElArabawy
- https://www.linkedin.com/in/ahmedelarabawy
in this presentation we cover Intro to Unix OS, its features and it management system like Process Management , file management and memory management system and its comparison with windows.
Daffodil International University is a co-educational private university located in Dhanmondi, Dhaka, Bangladesh. It was established on 24 January 2002 under the Private University Act, 1992
The interconnected characteristics of a market, such as the number and relative strength of buyers and sellers and degree of collusion among them, level and forms of competition, extent of product differentiation, and ease of entry into and exit from the market.Four basic types of market structure are (1) Perfect competition: many buyers and sellers, none being able to influence prices. (2) Oligopoly: several large sellers who have some control over the prices. (3) Monopoly: single seller with considerable control over supply and prices. (4) Monopsony: single buyer with considerable control over demand and prices.
Determining Requirements In System Analysis And DsignAsaduzzaman Kanok
Requirements determination and requirements structuring are two core components of system analysis. Traditionally, interviewing, questionnaires, directly observing and analyzing documents are four main methods adopted by system analysts to collect information. JAD and prototyping are two modern requirements determination methodologies, which are developed and based on the previous traditional methods. A well-structured representation of system requirements can dramatically improve the communication among analysts, designers, users, and programmers. DFD, structured English, decision tables, decision trees, and E-R diagrams are traditional primary requirements structuring tools. Nowadays, RAD and OOA are emerging to help streamline and shorten the total SDLC. While RAD SDLC packs traditional analysis phase and part of design phase into one step, OOA tries to make the outcomes of analysis phase can be reused by the following developing phases
When a human programmer develops a set of instructions to directly tell a microprocessor how to do something
They’re programming in the CPU’s own “language” This language, which consists of the very same binary codes which the Control Unit inside the CPU chip decodes to perform tasks, is often referred to as machine language.
it is often written in hexadecimal form, because it is easier for human beings to work with. For example, I’ll present just a few of the common instruction codes for the Intel 8080 micro-processor chip.
A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device.
The word modem is an acronym for modulator-demodulator. Basically, a modem is used for transmitting and receiving data over a communication channel, such as twisted-pair telephone lines, coaxial cables, and optical fibers. Currently the purpose of a modem is to convert a computer’s data stream to analog format so that it can be transmitted over the analog telephone line.
At the source, modulation techniques are used to convert digital
Data (0’s and 1’s) into analog form for transmission across the channel. At the destination, the received analog signal is converted to digital data via demodulation. This is a simplified explanation of how a modem works, and there are other issues that require attention; such as channel impairments, encryption, error detection/correction, data compression, modulation, handshake negotiation, and echo cancellation. These features will be discussed a bit later.
Certified Ethical Hacker is a qualification obtained in assessing the security of computer systems, using penetration testing techniques. The code for the CEH exam is 312-50, the certification is in Version 9 as of late 2015.
Statistical techniques for measuring the closeness of the relationship between variables.It measures the degree to which changes in one variable are associated with changes in another.It can only indicate the degree of association or covariance between variables. Covariance is a measure of the extent to which two variables are related.
Rural development is the process of improving the quality of life and economic well-being of people living in relatively isolated and sparsely populated areas.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
2. Kernel Architecture (UNIX)
Library
hardware
File Subsystem
character block
Hardware control
Buffer Cache
system call interface
Device driver
Inter process
communication
Scheduler
Memory
Managemen
t
Process Control
Subsystem
User program
User level
kernel level
User level
kernel level
3. What Is An Inode?
• An inode (index node) is a control structure that contains key
information needed by theOSto accessaparticular file.
• Several file names may be associated with a single inode, but each file
iscontrolled by exactly ONE inode.
• On the disk, there is an inode table that contains the inodes of all the
filesin thefilesystem.
• When a file is opened, its inode is brought into main memory and
stored in amemory-resident inodetable.
3
4. Data Structure for File Handling
• InodeTable
• List of all I-nodes
• Global Filetable.
• global to the kernel e.g. the byte offset in the file where the user's next read/write
will start
• theaccessrightsallowed to theopening process.
• ProcessFileDescriptor table.
• local to every process
• containsinformation liketheidentifiersof thefilesopened by theprocess.
• Whenever, a process creates a file, it gets an index from this table primarily known
as FileDescriptor.
5. Interaction Between Tables With An Example
• ExamplE:
• procEss a:
fd1 = opEn("/var/filE1", o_rdonlY);
fd2 = opEn("/var/filE2", o_rdWr);
fd3 = opEn("/var/filE1", o_WronlY);
•
• procEss B:
fd1 = opEn("/var/filE1", o_rdonlY);
fd2 = opEn("/var/filE3", o_rdonlY);
7. Explanation Of Figure
•Each o pe n() returns a file descriptor to the process, and
the corresponding entry in the user file descriptor
table points to a unique entry in the global file table even
though a file(/var/file1) is opened more then once.
•These global file table entries map to the in-core inode
table entry. Every opened file has a unique entry in the
global file table and the user file descriptor table but
kernel keeps only single entry per file in the in-core
inode table.
•Separate entries are created in user file descriptor and
global file table, but only the reference count is
increased in the inode table.
8. File System
•A file system is consists of a sequence of logical blocks
(512/1024 byteetc.)
•A filesystem hasthefollowing structure:
Boot Block Super Block Inode List Data Blocks
9. File System: Boot Block
•The beginning of the file system
•Contains bootstrap code to load the
operating system
•Initialize the operating system
•Typically occupies the first sector of the
disk
10. File System: Super Block
•Describes the state of a file system
•Describes the size of the file system
•How many files it can store
•Where to find free space on the file
system
•Other information
11. File System: Inode List
•Inodesareused to accessdisk files.
•Inodesmapsthedisk files
•For each filethereisan inodeentry in theinodelist
block
•Inodelist also keepstrack of directory structure
12. File System: Data Block
•Starts at the end of the inode list
•Contains disk files
•An allocated data block can belong to one
and only one file in the file system
13. Processes
•A process is the execution of a
program
•A process is consists of text
(machine code), data and stack
•Many process can run
simultaneously as kernel schedules
them for execution
•Several processes may be instances
of one program
•A process reads and writes its data
14. Processes
• Kernel hasaprocesstablethat keepstract of all activeprocesses
• Each entry in the process table contains pointers to the text, data,
stack and theU Areaof aprocess.
• All processes in UNIX system, except the very first process(process
0) which is created by the system boot code, are created by the fork
system call
15. Kernel Support for Process
Text
Stack
DataFile Descriptor Table
Per Process Region Table
Kernel Process
Table
Kernel Region
TableA Process
U Area
16. Context Switch
•When the kernel decides that it should execute
another process, it does a context switch, so that the
system executes in the context of the other process
•When doing a context switch, the kernel saves
enough information so that it can later switch back to
the first process and resume its execution.
17. Mode of Process Execution
• The UNIX process runs in two modes:
• Usermode
• Can access its own instructions and data, but not kernel
instruction and data
• Kernel mode
• Can access kernel and user instructions and data
• When a process executes a system call, the execution mode
of the process changes from user mode to kernel mode
• When moving from user to kernel mode, the kernel saves
enough information so that it can later return to user mode and
continue execution from where it left off.
• Mode change is not a context switch, just change in mode.
18. Process States
Processstatesare-
•Theprocessisrunning in user mode
•Theprocessisrunning in kernel mode
•Theprocessisnot executing, but it isready to run
assoon asthescheduler choosesit
•Theprocessissleeping
• Such aswaiting for I/O to complete
19. Process State Transition
2
4
1
3asleep
user running
kernel running
ready to run
system call
or interrupt
Interrupt return
schedule processsleep
wakeup
return
context switch permissible
20. Fork System Call
• When a process is created by fork, it contains duplicate copies of the
text, dataand stack segmentsof itsparent
• Also it has a file descriptor table (fdt) that contains references to the
same opened files as its parent, such that they both share the same file
pointer to each opened file
21. Fork System Call
Parent
Child
U Area
U Area
stack
data
text
stack
data
Kernel File
Table
Kernel Region
Table
Region
table
Region
table