... program
and data
User program
and data
Operating
System
Address
0xFFFFFFFF
Limit
Base
0
(a)
User-2 data
User-1 data
User program
Operating
System
Base-2
Limit-2
Limit-2
Limit-1
Base-2
Base-1
(b)
Limit-1
Base-1
... model in a distributed system.
Banking
system
Airline
reservation
Operating system
Web
browser
Compilers Editors
Application programs
Hardware
System
progr...
... of a global vari-
able.
Thread 1's
code
Thread 2's
code
Thread 1's
stack
Thread 2's
stack
Thread 1's
globals
Thread 2's
globals
Fig. 2- 17. Threads can have private ... equal.
Now we are engaged
in a great civil war
testing whether that
nation, or any nation
so conceived and so
dedicated, can long
endure. We are met on
a great battlefield of...
... A
B
C
3
2
2
9
4
7
Free: 3
(a)
A
B
C
3
4
2
9
4
7
Free: 1
(b)
A
B
C
3
0 ––
2
9
7
Free: 5
(c)
A
B
C
3
0
7
9
7
Free: 0
(d)
–
A
B
C
3
0
0
9
–
Free: 7
(e)
Has Max Has Max Has Max Has Max Has Max
Fig. ... Demonstration that the state in (a) is safe.
A
B
C
3
2
2
9
4
7
Free: 3
(a)
A
B
C
4
2
2
9
4
7
Free: 2
(b)
A
B
C
4
4 —4
2
9
7
Free: 0
(c)
A
B
C
4
—
2
9
7
Free:...
... virtual
page
0
Indexed
by hash on
virtual page
Virtual
page
Page
frame
Fig. 4-15. Comparison of a traditional page table with an inverted
page table.
(a)
Page loaded first
Most recently
loaded page
0
A
3
B
7
C
8
D
12
E
14
F
15
G
18
H
(b)
A ... possibilities also exist.
Page faults/sec
Number of page frames assigned
A
B
Fig. 4-29. Page fault rate as a function of the number...
... 5
Parity
P8-11
P4 -7
P0-3
Strip 11
Strip 7
P0-3
Fig. 5-19. RAID levels 0 through 5. Backup and parity drives are
shown shaded.
Spiral groove
Pit
Land
2K block of
user data
Fig. 5-20. Recording structure of a compact disc or ... laser when
writing
1.2 mm
Dye
Polycarbonate
Fig. 5-22. Cross section of a CD-R disk and laser (not to scale).
A silver CD-ROM has a similar struct...
... 4
Address of disk block 5
Address of disk block 6
Address of disk block 7
Address of block of pointers
Disk block
containing
additional
disk addresses
Fig. 6-15. An example i-node.
(a)
games
mail
news
work
attributes
attributes
attributes
attributes
Data ... utilization
Data rate
Block size (bytes)
Fig. 6-20. The solid curve (left-hand scale) gives the data rate of a
disk. T...
... procedure call. The stubs are
shaded gray.
(a)
Machine 1 Machine 2
Run-time
system
Operating
system
Shared memory
Application
Hardware
Run-time
system
Operating
system
Application
Hardware
(b)
Machine ... Situation if page 10 is read only and replication is used.
CPU 1
Code using
variable A
A
B
Shared
page
CPU 2
Code using
variable B
A
B
Network
A and B are unrelated
s...
... (b)
After the procedure A has been called. (c) Buffer overflow shown
in gray.
(a)
First page
(in memory)
Second page
(not in memory)
Page
boundary
A
A
A
A
A
A
(b)
B
A
A
A
A
A
(c)
F
A
A
A
A
A
Fig. ... capability.
Goal Threat
Data confidentiality Exposure of data
Data integrity Tampering with data
System availability Denial of service
Fig. 9-1. Security goals and t...
... parent
Allocate child's stack and user area
Fill child's user area from parent
Allocate PID for child
Set up child to share parent's text
Copy page tables for data and stack
Set up sharing ... 12131415
(b)
(c)
Process A& apos;s
shared
lock
A& apos;s shared lock
B's shared lock
C's shared lock
A
B
45 67
45 678 9
2345 89101 17
6
Fig. 10- 27. (a) A file with...