UNIT V CASE STUDY
Linux System – Design Principles, Kernel Modules, Process Management, Scheduling, Memory Management, Input-Output Management, File System, Inter-process Communication; Mobile OS – iOS and Android – Architecture and SDK Framework, Media Layer, Services Layer, Core OS Layer, File System.
UNIT IV FILE SYSTEMS AND I/O SYSTEMS 9
Mass Storage system – Overview of Mass Storage Structure, Disk Structure, Disk Scheduling and Management, swap space management; File-System Interface – File concept, Access methods, Directory Structure, Directory organization, File system mounting, File Sharing and Protection; File System Implementation- File System Structure, Directory implementation, Allocation Methods, Free Space Management, Efficiency and Performance, Recovery; I/O Systems – I/O Hardware, Application I/O interface, Kernel I/O subsystem, Streams, Performance.
32-bit preemptive multitasking operating system for Intel microprocessors. Uses a micro-kernel architecture. Uses a micro-kernel architecture. Environmental subsystems emulate different operating systems. Protection subsystems provide security functions
UNIT V CASE STUDY
Linux System – Design Principles, Kernel Modules, Process Management, Scheduling, Memory Management, Input-Output Management, File System, Inter-process Communication; Mobile OS – iOS and Android – Architecture and SDK Framework, Media Layer, Services Layer, Core OS Layer, File System.
UNIT IV FILE SYSTEMS AND I/O SYSTEMS 9
Mass Storage system – Overview of Mass Storage Structure, Disk Structure, Disk Scheduling and Management, swap space management; File-System Interface – File concept, Access methods, Directory Structure, Directory organization, File system mounting, File Sharing and Protection; File System Implementation- File System Structure, Directory implementation, Allocation Methods, Free Space Management, Efficiency and Performance, Recovery; I/O Systems – I/O Hardware, Application I/O interface, Kernel I/O subsystem, Streams, Performance.
32-bit preemptive multitasking operating system for Intel microprocessors. Uses a micro-kernel architecture. Uses a micro-kernel architecture. Environmental subsystems emulate different operating systems. Protection subsystems provide security functions
UNIT II PROCESS MANAGEMENT
Processes – Process Concept, Process Scheduling, Operations on Processes, Inter-process Communication; CPU Scheduling – Scheduling criteria, Scheduling algorithms, Multiple-processor scheduling, Real time scheduling; Threads- Overview, Multithreading models, Threading issues; Process Synchronization – The critical-section problem, Synchronization hardware, Mutex locks, Semaphores, Classic problems of synchronization, Critical regions, Monitors; Deadlock – System model, Deadlock characterization, Methods for handling deadlocks, Deadlock prevention, Deadlock avoidance, Deadlock detection, Recovery from deadlock.
UNIT I OPERATING SYSTEM OVERVIEW
Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory Hierarchy, Cache Memory, Direct Memory Access, Multiprocessor and Multicore Organization. Operating system overview-objectives and functions, Evolution of Operating System.- Computer System Organization Operating System Structure and Operations- System Calls, System Programs, OS Generation and System Boot.
Windows Architecture Explained by StacksolStacksol
Now here we explained the windows architecture. The inside view of Microsoft Windows. The architecture of Windows NT, a line of operating systems produced and sold by Microsoft, is a layered design that consists of two main components, user mode and kernel mode.
Get heavyweight performance and efficiency at your workplace with the ultra-light and power-packed Microsoft Surface, which is transforming enterprises around the world.
Microsoft Office 365 India celebrated 100K Facebook fans by planting 1000 saplings as part of the #Tags4Trees Initiative. This infograph captures some nuggets we heard people say during the drive. Microsoft Office 365 enables you to work and collaborate from anywhere and from any device. Visit www.office.microsoft.com to know more and how you can reap the higher efficiencies and productivity by migrating to the Cloud.
Planning your Digital Workplace: A Systems-Based Planning ApproachChristian Buckley
When deploying a “Digital Workplace,” where do you begin? What is needed is an iterative, strategic, and systems-based approach of identifying core challenges at the team and company level, working with key stakeholders to identify appropriate strategies, building a solution using a scalable, repeatable, and sustainable change model. This approach drives stakeholder engagement, and ensures a more holistic solution that aligns with the needs of the business at every level. In this presentation, we walk through a systems-based planning approach for Enterprise Collaboration. Topics will include:
--Engaging leaders in a systems analysis, identifying high-priority needs and challenges
--Outlining a set of targeted and strategic actions based on common customer scenarios
--Developing an implementation plan to support successful operational and improvement strategies
The intent of this presentation is to help organizations incorporate systems-based planning into their Digital Workplace planning processes, using real-world customer examples, and to receive tips on how to fold these best practices into their own strategies.
What are the future trends in the Digital Workplace? Are we facing even bigger disruption from social, gamification, and the trends that have been prevalent over the last years or are we coming to a point where things are beginning to mature?
In this presentation - from Nordic Intranet Summit, November 2014 - I have looked at some common themes that I see across both the Nordic region and in the Intranet/Digital Workplace community as a whole.
Will there be Hoverboards? Not very likely... While innovations like these are exciting and fun, the real trends are what we see when we look at innovative solutions and innovative vendors.
The question is: Are we making the most of the emergent trends or are we still using the same thinking and logic we did when the Sharepoint 2007 intranet was launched? It's time to challenge ourselves and our peers!
UNIT II PROCESS MANAGEMENT
Processes – Process Concept, Process Scheduling, Operations on Processes, Inter-process Communication; CPU Scheduling – Scheduling criteria, Scheduling algorithms, Multiple-processor scheduling, Real time scheduling; Threads- Overview, Multithreading models, Threading issues; Process Synchronization – The critical-section problem, Synchronization hardware, Mutex locks, Semaphores, Classic problems of synchronization, Critical regions, Monitors; Deadlock – System model, Deadlock characterization, Methods for handling deadlocks, Deadlock prevention, Deadlock avoidance, Deadlock detection, Recovery from deadlock.
UNIT I OPERATING SYSTEM OVERVIEW
Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory Hierarchy, Cache Memory, Direct Memory Access, Multiprocessor and Multicore Organization. Operating system overview-objectives and functions, Evolution of Operating System.- Computer System Organization Operating System Structure and Operations- System Calls, System Programs, OS Generation and System Boot.
Windows Architecture Explained by StacksolStacksol
Now here we explained the windows architecture. The inside view of Microsoft Windows. The architecture of Windows NT, a line of operating systems produced and sold by Microsoft, is a layered design that consists of two main components, user mode and kernel mode.
Get heavyweight performance and efficiency at your workplace with the ultra-light and power-packed Microsoft Surface, which is transforming enterprises around the world.
Microsoft Office 365 India celebrated 100K Facebook fans by planting 1000 saplings as part of the #Tags4Trees Initiative. This infograph captures some nuggets we heard people say during the drive. Microsoft Office 365 enables you to work and collaborate from anywhere and from any device. Visit www.office.microsoft.com to know more and how you can reap the higher efficiencies and productivity by migrating to the Cloud.
Planning your Digital Workplace: A Systems-Based Planning ApproachChristian Buckley
When deploying a “Digital Workplace,” where do you begin? What is needed is an iterative, strategic, and systems-based approach of identifying core challenges at the team and company level, working with key stakeholders to identify appropriate strategies, building a solution using a scalable, repeatable, and sustainable change model. This approach drives stakeholder engagement, and ensures a more holistic solution that aligns with the needs of the business at every level. In this presentation, we walk through a systems-based planning approach for Enterprise Collaboration. Topics will include:
--Engaging leaders in a systems analysis, identifying high-priority needs and challenges
--Outlining a set of targeted and strategic actions based on common customer scenarios
--Developing an implementation plan to support successful operational and improvement strategies
The intent of this presentation is to help organizations incorporate systems-based planning into their Digital Workplace planning processes, using real-world customer examples, and to receive tips on how to fold these best practices into their own strategies.
What are the future trends in the Digital Workplace? Are we facing even bigger disruption from social, gamification, and the trends that have been prevalent over the last years or are we coming to a point where things are beginning to mature?
In this presentation - from Nordic Intranet Summit, November 2014 - I have looked at some common themes that I see across both the Nordic region and in the Intranet/Digital Workplace community as a whole.
Will there be Hoverboards? Not very likely... While innovations like these are exciting and fun, the real trends are what we see when we look at innovative solutions and innovative vendors.
The question is: Are we making the most of the emergent trends or are we still using the same thinking and logic we did when the Sharepoint 2007 intranet was launched? It's time to challenge ourselves and our peers!
Are you ready to launch a digital workplace initiative at your organization? Learn from top thought leaders across HR, IT, and Operations on how to accelerate employee engagement and productivity. Download our full eBook to learn more about the process, technology, and cultural shifts necessary for achieving greater employee productivity and engagement.
Harnessing Revolution: Creating The Future Workforceaccenture
The very concept of work is being redefined as different generations enter and exit the workforce amidst a rapidly changing technological landscape that includes wearables, artificial intelligence and analytics. It is the responsibility of every business leader to reskill their people to be relevant in the future workforce and ready to adapt to change. The leaders who make their people a strategic business priority will be the ones who make the greatest gains in growth and innovation. Learn more about how to prepare for the talent needs of tomorrow, today and explore the research of 10,000+ working people across 10 countries at: http://www.accenture.com/HarnessingRevolution
Chorus - Distributed Operating System [ case study ]Akhil Nadh PC
ChorusOS is a microkernel real-time operating system designed as a message-based computational model. ChorusOS started as the Chorus distributed real-time operating system research project at Institut National de Recherche en Informatique et Automatique (INRIA) in France in 1979. During the 1980s, Chorus was one of two earliest microkernels (the other being Mach) and was developed commercially by Chorus Systèmes. Over time, development effort shifted away from distribution aspects to real-time for embedded systems.
lecture 1 (Part 2) kernal and its categoriesWajeehaBaig
Kernel and its categories
computer start up
Architecture of Operating system(Monolithic ,Layered,Micro kernel,Network and distributed O.S)
Interrupt and its function
System calls
System boot
O.S services(for system, for user)
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. This file system can be viewed logically
consist of following parts:
Disk structure
Disk scheduling
Disk Management
Swap-space Management
3. Disk provide the bulk of secondary storage
Magnetic tape was used an early secondary storage
medium
Modern disk drives are addressed as large one-
dimensional arrays of logical blocks
The logical blocks is the smallest unit of tranfer.
The one-dimensional array of logical blocks is
mapped onto the sectors of the disk sequentially.
It is difficult to perform two reasons
Most disks have some defective sectors.
The number of sectors per track is not a
constant on some drives.
4. The disk drives has fast access time and disk bandwidth
The access time has two major components.
Seek time
Rotational latency
The disk bandwidth is the total number of byes
transferred, divided by the total time between the
first request for service and the completion of the last
transfer.
The request specifies several pieces of information
I. Whether this operation is input or output
II. What the disk address for the transfer is
III. What the memory address for the transfer is
IV. What the number of bytes to the transferred is
5. The simplest form of disk scheduling is the first
come, first-served(FCFS) algorithm.
The algorithm does not provide the fastest
services.
SSTF Scheduling
It seems reasonable to service all the requests
close to the current head position, before
moving the head far away to service.
The assumption is the basis for the shortest-
seek-time-first algorithm
The SSTF algorithm selects the request with
the minimum seek time from the current head
position
6. In the scan algorithm the disk arm starts at one
end of the disk, and moves toward the other end.
The direction of head movement is reversed, and
servicing continues.
The scan algorithm is sometimes called the
elevator algorithm
C- SCAN scheduling
Circular scan scheduling is a variant of SCAN designed
to provide a more wait time
The C-SCAN scheduling algorithm treats the cylinders
as a circular list that wraps around from the final cylinder
to the first one.
7. • The scheduling algorithms described the seek
distances for modern disks, the rotational latency
Can be nearly as large as the average seek time.
• But it is difficult for the operating system to
scheduled for improved rotational latency because
modern disks do not disclose the physical location of
logical blocks.
8. Disk Formatting
• A new magnetic disk is a blank slate.
• It must be divided into sectors that the disk controller
can read and write. This process is called Low level
formatting
• A sector number and an error-correcting code.
• The operating system still needs to record its own data
structures.
• In two steps
• The first step is two partition the disk into one or more
groups of cylinders
• The second step is logical formatting.
• In this step the operating system stores the initial file
system data structures into the disk
9. The bootstrap is stored in read only memory
The full bootstrap program is stored in a partition
called the boot blocks, at a fixed location on the
disk.
A disk that has a boot partition is called a boot
disk or system disk.
Bad blocks
Most frequently, one or more sectors become defective.
Most disks even come form the factory with bad blocks
This scheme is known as sector sparing or forwarding
10. Swap-space management is another low-level task of the
operating system
The main goal for the design and implementation of swap
space is to provide the best throughput for the
Virtual memory system
Swap-space use
Swap space is used in various ways by different operating systems,
depending on the implemented memory-management
Algorithms.
Swap-space Location
A swap space can reside in two places.
Swap space can be carved out of the normal file system or it can be
in a seperated disk partition.
11.
12. Windows 2000 Operating system is a 32-bit
preemptive multitasking operating system for Intel
pentium and later microprocessor.
In 1980 Microsoft and IBM cooperated to develop
the OS/2 operating system in single processor Intel
80286
Microsoft developed a portable operating system
that supported both the application system.
There are four versions of windows 2000
The professional version intended for desktop use.
The other three are server version datacenter
version.
13. The design goals that Micros0ft has stated for
windows 2000 include Extensibility, portability,
compatibility, performance.
Extensibility refers to the capacity of the operating
system to keep up advances in computing technology
Windows 2000 uses a client-server model.
Mach operating system and supports multiple
processing by remoter procedure call(RPC).
An operating system is portable and it can be
moved from one hardware architecture to another.
14. The architecture of windows 2000 is a layered
system of modules.
The user-mode subsystems are in two categories
environment subsystems emulate different operating
systems;the subsystems provide security functions.
One of the chief advantages of the architecture is
the intreactions between modules can be kept simple
remainder of this section describes these layers and
subsytems.
15. HAL is the layer of software that hides hardware
differences from the operating system,virtual-machine
interface that is used by the kernel,the exculive and
device drivers.
One advantage of this approach is that only a single
of each device driver is needed-it can run on all
hardware flatform will porting the driver code.
16. The kernal of windows 2000 provides the fundation
for the executive and subsystems.
kernal uses to sets of objects. The first set
comparises the dispatcher.
Dispatcher objects control dispatching and
synchoronous the event object is used to record an
event occurances.
Synchronize the later with some action A semaphore
objects acts as a counter or gate to control the number
that access some resource.
The thread object is the entity that is run kernal and
is associated with a process object.
17. Timer objects are used to keep track of the time
and
and to signal time outs when operations and need to
be interrupted
The second set of kernal objects comparises the
control objects.
The power states object to check whether the
power
a process object represents the virtual address
space and control.
The system uses the profile object to measure the
amount of time used by a amount of code
18. Windows 2000 uses the process and threads for
executable code .
Each process has one or more threads. Each thread
has its own state.
It includes a priority, processor, affinity, and
accounting information.
The six possible thread states or ready, stand by ,
running, waiting, and terminated.
19. Ready means waiting to run.
The highest priority thread is moved to the standby
state.
A thread is running when it is executing on a
processor
A thread is in the waiting state when it is waiting for
a signal
A new thread is in the transition state while it is
waiting resourcs necessary for execlution
A thread enters the terminated state finishes
execution
20. Kernal also provides trap handling for exceptions
and interrupts that are used by hardware or software
windows 2000 defines several architecture
exceptions including memory-access violation integer
overflow or underflow, integer divide by zero, floating-
point by zero , illegal instruction , data misalignment,
privileged instruction, read error , guard-page,
violation, paging files, quote exceeded, debugger, point
and debugger, single step.
The exeption dispatcher creates and exception that
contains the reason for the exception and finds an
exception handler deal with it.
21. The kernal uses an interrupted dispatch table to
bind each interrupt that a service routine
Windows 2000 takes advantage of this property to
software interrupts to perform system functions
kernal uses the dispatch interrupt to control thread
context switching to the kernal is running.
It queues a deferred procedure call(DPC) that
contains the address of the function to be executed
and generates interrupt.
They cannot modify its memory: create, acquire, or
wait on objects, call system services or page faults.
22. Third reponsibility of the kernal is to provide low-
level processor synchronization.
The APC mechanism is similar to the DPC algorithm
but was most use.
The APC mechanism enables threads to set up a
procedure call that happen out of the blue at some
future time.
windows 2000 can run on symmetric multiprocessor
machines, so the kernal must prevent two of its
threads from modifying a shared data structure in
same time.
23. The fourth and final responsibility of the kernal is
to provide recovery after a failure
A power fail interrupt which has the second-highest
priority notifies the operating system whenever a
power loss is detected.
The power notify object provides a way for a device
driver to register a routine that is call on power
restoration and ensures that devices get set to the
proper and recovery
27. Windows 2000 supports both peer-to-peer and
client server networking.
The networking components provide data transport,
interprocess communication file sharing across a network,
and the ability to send print jobs to remote printers.
Protocols
Distributed processing Mechanisms