Operating System Review
Chapter 1 Introduction to Operating Systems
Definition: Manage system resources, control program execution, improve human-computer interface, provide various services, and rationally organize computer workflow And a system software that provides a good operating environment for users to use computers conveniently and effectively.
Functions: Processor management, storage management, device management, file management, networking and communication management
Features: Concurrency, sharing (1. Transparent resource sharing 2. Exclusive resource sharing), asynchrony
Category: batch operating system, time-sharing operating system, real-time operating system
Chapter 2 Processor Management
Process Definition: A process is a program with independent functions on a certain data collection A running activity is also the basic unit for resource allocation and protection by the operating system.
Process status and transition: p73
Three-state model: running state, ready state, waiting state
Five-state model: new state, terminated state What is the reason for the proposal?
Requires the ability to draw pictures to explain that certain transformations do not exist.
The motivation for introducing multi-threading: reducing the time and space overhead incurred when programs are executed concurrently, making concurrency granularity finer and concurrency better.
Advantages of threads: fast thread switching, easy communication, reduced management overhead, and improved concurrency
PCB (Process Control Block) process control block: the unique identifier of the existence of a process, which is used by the operating system to record It is the collection of dynamic characteristics of the process and the data structure that describes the process status and environmental information. It is also the only data structure for the operating system to control the process and the main basis for managing the process. p75
What is the concept of TCB?
Dynamic/static priority?
Processor Scheduling: p101 Example
First come, first served algorithm
Shortest job first algorithm (concept)
Shortest remaining time priority algorithm
Highest response ratio priority algorithm (concept)
Chapter 3 Synchronization, communication and deadlock
Bernstein conditions? Bernstein (short answer)
Deadlock: A group of processes is stuck in a state of waiting forever due to competition for resources.
Hunger: A runnable process is delayed indefinitely by the scheduler and cannot be executed because other processes always take precedence over it.
Process synchronization: Concurrent processes to complete a common task coordinate their activities based on a certain condition, because the coordination constraints caused by waiting for and transmitting signals or messages need to be arranged in the order of execution at certain locations. relation.
Critical section: Program segment related to shared variables in concurrent processes.
Critical resources: The resources represented by shared variables, that is, resources that can only be used by one process at a time.
Three principles of critical section scheduling (mutually exclusive use, let in when free; wait if busy, limited wait; choose one to enter, the algorithm is feasible.):
At most one process can enter the critical section for execution at a time.
If there is already a process in the critical section, other processes trying to enter this critical section should wait.
The process entering the critical section should exit within a limited time to allow a process in the waiting queue to enter.
Software algorithm for critical section management:
Analysis
Will there be any problems?
When will it be released?
Hardware facilities for critical section management:
Turn off interrupts
Test and set instructions
Swap instructions
Semaphore and PV operation: p134
pv operation definition (one yuan, general)?
Comprehensive question:
The 5 philosophers dining problem (no deadlock solution) p139
Producer-consumer problem ( Many-to-many, many buffers) p140
Reader-writer problem p141
Barber problem p142
Monk Fetching Water
Deadlock
Definition: If each process in a process set is waiting, it can only wait for other processes in the set. The process can only cause events, and it will be stuck in a stalemate indefinitely.
Generated conditions:
Mutually exclusive conditions
Possession and waiting conditions
No deprivation condition
Loop waiting condition
Deadlock avoidance: Comprehensive question 15 points
Banker’s algorithmData structure p163
Algorithm description:
Safety sequence at time T0
Process P1 requests resources (can it be satisfied? Why? )
Chapter 4 Storage Management
Program link type: (fill in the blank)
Static link
Dynamic link
Runtime link
Static address relocation: The loader implements the loading and address conversion of the loading code, loads it into the designated area of memory allocated to the process, and all logical addresses in it are modified into a memory physical address.
Dynamic address relocation: The loader implements the loading of the loading code module and loads it into the designated area of the memory allocated to the process, but the logical address of the application processed by the linker is not When any modification is made, the starting address of the program memory is placed into the hardware special register - the relocation register. During program execution, whenever the CPU refers to a memory address (accessing programs and data), the hardware intercepts this logical address and adds the value of the relocation register before it is sent to the memory in order to achieve address translation.
Paging storage management p206
Concept:
Page
Page frame
Logical address
Memory page frame table
Page table
Paging/ What is the implementation principle of segmented dynamic link library? (Explanation + Drawing)
Comprehensive question:
Given the logical address, find the physical address? (Draw)
Given the logical address and page size, calculate the physical address?
Comparison of segmentation and paging (short answer):
Segmentation is a logical unit of information, determined by the logical structure and meaning of the source program , visible to the user, the segment length is determined by the user according to needs, and the segment start address can start from any memory address. In the segmented method, the source program (short number, intra-segment displacement) still maintains a two-dimensional (address) structure after being linked and assembled. The purpose of introduction is to meet the needs of users for modular programming.
Paging is a physical unit of information. It has nothing to do with the logical structure of the source program and is invisible to the user. The page length is determined by the system (hardware). The page can only start from an integer multiple of the page size. In the paging mode, the source program (page number, intra-page displacement) becomes a one-dimensional (address) structure after link assembly. The purpose of introduction is to achieve discrete allocation and improve memory utilization.
Page fault interruption rate p223
Concept: Number of unsuccessful accesses?
Draw a picture, find the page missing interruption rate? p229
Chapter 5 Device Management
I/O control method: (fill in the blank)
Polling method
Interrupt mode
DMA mode
Channel mode
Buffer technology:
Single buffering p265
Double buffering p266
Search positioning: (example questions, short answers) p270
First come, first served algorithm
Shortest search time first algorithm
Scan algorithm
Elevator scheduling algorithm
Cycle Scan Algorithm
Reference bibliography:
-"Operating System Tutorial (Fifth Edition)" by Fei Xianglin and Luo Bin Higher Education Press
The above is the detailed content of Summary of operating system skills. For more information, please follow other related articles on the PHP Chinese website!
Linux Operations: Utilizing the Maintenance ModeApr 19, 2025 am 12:08 AMLinux maintenance mode can be entered through the GRUB menu. The specific steps are: 1) Select the kernel in the GRUB menu and press 'e' to edit, 2) Add 'single' or '1' at the end of the 'linux' line, 3) Press Ctrl X to start. Maintenance mode provides a secure environment for tasks such as system repair, password reset and system upgrade.
Linux: How to Enter Recovery Mode (and Maintenance)Apr 18, 2025 am 12:05 AMThe steps to enter Linux recovery mode are: 1. Restart the system and press the specific key to enter the GRUB menu; 2. Select the option with (recoverymode); 3. Select the operation in the recovery mode menu, such as fsck or root. Recovery mode allows you to start the system in single-user mode, perform file system checks and repairs, edit configuration files, and other operations to help solve system problems.
Linux's Essential Components: Explained for BeginnersApr 17, 2025 am 12:08 AMThe core components of Linux include the kernel, file system, shell and common tools. 1. The kernel manages hardware resources and provides basic services. 2. The file system organizes and stores data. 3. Shell is the interface for users to interact with the system. 4. Common tools help complete daily tasks.
Linux: A Look at Its Fundamental StructureApr 16, 2025 am 12:01 AMThe basic structure of Linux includes the kernel, file system, and shell. 1) Kernel management hardware resources and use uname-r to view the version. 2) The EXT4 file system supports large files and logs and is created using mkfs.ext4. 3) Shell provides command line interaction such as Bash, and lists files using ls-l.
Linux Operations: System Administration and MaintenanceApr 15, 2025 am 12:10 AMThe key steps in Linux system management and maintenance include: 1) Master the basic knowledge, such as file system structure and user management; 2) Carry out system monitoring and resource management, use top, htop and other tools; 3) Use system logs to troubleshoot, use journalctl and other tools; 4) Write automated scripts and task scheduling, use cron tools; 5) implement security management and protection, configure firewalls through iptables; 6) Carry out performance optimization and best practices, adjust kernel parameters and develop good habits.
Understanding Linux's Maintenance Mode: The EssentialsApr 14, 2025 am 12:04 AMLinux maintenance mode is entered by adding init=/bin/bash or single parameters at startup. 1. Enter maintenance mode: Edit the GRUB menu and add startup parameters. 2. Remount the file system to read and write mode: mount-oremount,rw/. 3. Repair the file system: Use the fsck command, such as fsck/dev/sda1. 4. Back up the data and operate with caution to avoid data loss.
How Debian improves Hadoop data processing speedApr 13, 2025 am 11:54 AMThis article discusses how to improve Hadoop data processing efficiency on Debian systems. Optimization strategies cover hardware upgrades, operating system parameter adjustments, Hadoop configuration modifications, and the use of efficient algorithms and tools. 1. Hardware resource strengthening ensures that all nodes have consistent hardware configurations, especially paying attention to CPU, memory and network equipment performance. Choosing high-performance hardware components is essential to improve overall processing speed. 2. Operating system tunes file descriptors and network connections: Modify the /etc/security/limits.conf file to increase the upper limit of file descriptors and network connections allowed to be opened at the same time by the system. JVM parameter adjustment: Adjust in hadoop-env.sh file
How to learn Debian syslogApr 13, 2025 am 11:51 AMThis guide will guide you to learn how to use Syslog in Debian systems. Syslog is a key service in Linux systems for logging system and application log messages. It helps administrators monitor and analyze system activity to quickly identify and resolve problems. 1. Basic knowledge of Syslog The core functions of Syslog include: centrally collecting and managing log messages; supporting multiple log output formats and target locations (such as files or networks); providing real-time log viewing and filtering functions. 2. Install and configure Syslog (using Rsyslog) The Debian system uses Rsyslog by default. You can install it with the following command: sudoaptupdatesud


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Zend Studio 13.0.1
Powerful PHP integrated development environment

SublimeText3 Mac version
God-level code editing software (SublimeText3)

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool







