1 Case Study 1: UNIX and LINUX Chapter History of unix 10.2 Overview of unix 10.3 Processes in unix 10.4 Memory management in unix 10.5 Input/output.

Slides:



Advertisements
Présentations similaires
Canada BIM Council Conseil canadien de la modélisation des données de bâtiment Title of Presentation Name of Presenter CanBIM Member Position, Department,
Advertisements

Techniques de leau et calcul des réseaux séance 2a Michel Verbanck 2012.
The value chain and added-value networks
THE ADJECTIVES: BEAU, NOUVEAU AND VIEUX 1.
1 MQMaster Management of MQSeries October 2012 October 2nd 2012 Contact: Mr NAUDIN David Phone +33 (0) Mail
Structures de données et algorithmes – TP7 Maria-Iuliana Dascalu, PhD
RozoFS KPI’s edition /04/2014. © Fizians Ce document ne peut être reproduit ou communiqué sans autorisation écrite. 2 RozoFS high level architecture.
PERFORMANCE One important issue in networking is the performance of the network—how good is it? We discuss quality of service, an overall measurement.
Traffic Sign Recognition Jacob Carlson Sean St. Onge Advisor: Dr. Thomas L. Stewart.
IP Multicast Text available on
From Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide by Diane Teare, Bob Vachon and Rick Graziani ( ) Copyright © 2015 Cisco Systems,
Overview of SUN’s Unix Campus-Booster ID : **XXXXX Copyright © SUPINFO. All rights reserved Introduction to Solaris 10.
Architecture de Réseaux Travaux Pratiques
TP4
Animé par : Renaud de Colombel
Architecture de Réseaux Travaux Pratiques
IDL_IDL bridge The IDL_IDLBridge object class allows an IDL session to create and control other IDL sessions, each of which runs as a separate process.
Le Passé du Subjonctif Verbes: page 386.
© 2001, Cisco Systems, Inc. CSIDS 2.0—1-1 Cisco Secure Intrusion Detection System 2.0.
Réunion service Instrumentation Activités CMS-Traces
Procédure de récupération
Architecture de Réseaux Travaux Pratiques
The past infinitive You already know how to use infinitives in some sentences. Ex. Le conflit va éclater entre les deux pays. Conflict is going to break.
Quantum Computer A New Era of Future Computing Ahmed WAFDI ??????
Les questions et les mots interrogatifs
MATCHSLIDE : INT contribution Patrick HORAIN Hichem ATTI Waheb LARBI Presented as : "TELESLIDE: Technical aspects ", Jacques Klossa & Patrick Horain, Joint.
Statistics & Econometrics Statistics & Econometrics Statistics & Econometrics Statistics & Econometrics Statistics & Econometrics Statistics & Econometrics.
Conjugating regular –re verbs in French
Les Fruits :.
Conditional Clauses By Mª Mercedes Sánchez Year
Exercices: Système d’Information
© 2004 Prentice-Hall, Inc.Chap 4-1 Basic Business Statistics (9 th Edition) Chapter 4 Basic Probability.
Quiz What are the different Copper cable types ? How is STP better than UTP ? What type of cable should we use between : Router-Switch, PC-Router, Hub-Switch.
1. Financial (Accounting) Statements  Financial or Accounting statements are used for reporting corporate activity. 2 For Stakeholders.
P&ID SYMBOLS. P&IDs Piping and Instrumentation Diagrams or simply P&IDs are the “schematics” used in the field of instrumentation and control (Automation)
1 ISO/TC 176/SC 2/N1219 ISO 9001:2015 Revision overview - General users July 2014.
1210 压辊安装 List of tools to use 1, 2, tongbang, hammer 3, circlip pliers, installing a circlip using 4 discus with a screwdriver, a word,
High-Availability Linux Services And Newtork Administration Bourbita Mahdi 2016.
Des adjectifs irreguliers
C’est quel numéro? Count the numbers with pupils.
Six months after the end of the operations
Qu’est-ce que tu as dans ta trousse?
Pato et Elly font du sport aussi.
Qu’est-ce que tu as dans ta trousse?
Forum national sur l’IMT de 2004.
Definition Division of labour (or specialisation) takes place when a worker specialises in producing a good or a part of a good.
C’est quel numéro? Count the numbers with pupils.
Roots of a Polynomial: Root of a polynomial is the value of the independent variable at which the polynomial intersects the horizontal axis (the function.
1-1 Introduction to ArcGIS Introductions Who are you? Any GIS background? What do you want to get out of the class?
Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1.
Le verbe « être » au pluriel
What’s the weather like?
POWERPOINT PRESENTATION FOR INTRODUCTION TO THE USE OF SPSS SOFTWARE FOR STATISTICAL ANALISYS BY AMINOU Faozyath UIL/PG2018/1866 JANUARY 2019.
SLIDE TITLE PowerPoint Presentation SUBTITILE HERE.
By : HOUSNA hebbaz Computer NetWork. Plane What is Computer Network? Type of Network Protocols Topology.
BIENVENUE. Sommaire Maison Intelligente La Domotique ? Qu'est ce que c'est la domotique ? Détails et exemple Ma partie dans ce projet Détails de mon projet.
Paul Eluard Dans Paris.
HUAWEI TECHNOLOGIES CO., LTD. VLAN Principles. Copyright © 2016 Huawei Technologies Co., Ltd. All rights reserved. Page 2 Foreword A Virtual Local Area.
4C Telling Exact Time.
Avoiding the Pitfalls of Bad Slides Tips to be Covered Outlines Slide Structure Fonts Colour Background Graphs Spelling and Grammar Conclusions Questions.
Le Passé Composé (Perfect Tense)
2.2 Des partenaires souhaitables et des invités moins souhaitables
Les négatifs et l’interrogation
Lequel The Last Part.
University : Ammar Telidji Laghouat Faculty : Technology Department : Electronics 3rd year Telecommunications Professor : S.Benghouini Student: Tadj Souad.
C’est quel instrument?.
Cold Fusion High Availability “Taking It To The Next Level” Presenter: Jason Baker, Digital North Date:
Mon rêve serait d’être chirurgien.
LF
M’SILA University Information Communication Sciences and technology
Transcription de la présentation:

1 Case Study 1: UNIX and LINUX Chapter History of unix 10.2 Overview of unix 10.3 Processes in unix 10.4 Memory management in unix 10.5 Input/output in unix 10.6 The unix file system 10.7 Security in unix

2 UNIX The layers of a UNIX system. User Interface

3 UNIX Utility Programs A few of the more common UNIX utility programs required by POSIX

4 UNIX Kernel Approximate structure of generic UNIX kernel

5 Processes in UNIX Process creation in UNIX.

6 POSIX The signals required by POSIX.

7 System Calls for Process Management s is an error code pid is a process ID residual is the remaining time from the previous alarm

8 POSIX Shell A highly simplified shell

9 Threads in POSIX The principal POSIX thread calls.

10 The ls Command Steps in executing the command ls type to the shell

11 Flags for Linux clone Bits in the sharing_flags bitmap

12 UNIX Scheduler The UNIX scheduler is based on a multilevel queue structure

13 Booting UNIX The sequences of processes used to boot some systems cp

14 Handling Memory Process A's virtual address space Physical memory Process B's virtual address space Process A Process B

15 Sharing Files Two processes can share a mapped file. A new file mapped simultaneously into two processes

16 System Calls for Memory Management s is an error code b and addr are memory addresses len is a length prot controls protection flags are miscellaneous bits fd is a file descriptor offset is a file offset

17 Paging in UNIX The core map in 4BSD. The core map has an entry for each page

18 Paging in Linux (1) Linux uses three-level page tables

19 Paging in Linux (2) Operation of the buddy algorithm. Buddy algorithm

20 Networking Use of sockets for networking

21 Terminal Management The main POSIX calls for managing the terminal

22 UNIX I/O (1) Some of the fields of a typical cdevsw table

23 UNIX I/O (2) The UNIX I/O system in BSD

24 Streams An example of streams in System V

25 The UNIX File System (1) Some important directories found in most UNIX systems

26 The UNIX File System (2) Before linking. After linking. (a) Before linking. (b) After linking

27 The UNIX File System (3) Separate file systems After mounting (a) (b) (a) Before mounting. (b) After mounting

28 Locking Files (a) File with one lock (b) Addition of a second lock (c) A third lock

29 System Calls for File Management s is an error code fd is a file descriptor position is a file offset

30 The lstat System Call Fields returned by the lstat system call.

31 System Calls for Directory Management s is an error code dir identifies a directory stream dirent is a directory entry

32 UNIX File System (1) Disk layout in classical UNIX systems

33 UNIX File System (2) Directory entry fields. Structure of the i-node

34 UNIX File System (3) The relation between the file descriptor table, the open file description

35 UNIX File System (4) A BSD directory with three files The same directory after the file voluminous has been removed

36 The Linux File System Layout of the Linux Ex2 file system.

37 Network File System (1) Examples of remote mounted file systems Directories are shown as squares, files as circles

38 Network File System (2) The NFS layer structure. The NFS layer structure

39 Security in UNIX Some examples of file protection modes

40 System Calls for File Protection s is an error code uid and gid are the UID and GID, respectively