... the poster of the message and the target of the message don’t
have to be one and the same, they can be as shown in this snippet (read the
334 Chapter 9: Messages and Threads
case MENU_ADV_HELP_MSG:
... looper and a handler). Throughout this chapter you’ll see sev-
eral examples of the creating of messages and the dispatching of these messages
both by t...
... application data member. The Save file panel, on the other hand,
affects the window, and is referenced by a window data member. So I want the
message sent to the window object rather than the application ... node (data). The entry can be represented by an entry_ref or
a BEntry object. Currently the entry is in the form of an entry_ref. Here the
entry is stored in a BEntr...
... unimportant.
2 Chapter 1: BeOS Programming Overview
to appear almost daily, and each company needs some way to ensure that the
public views their product as the best. Unsurprisingly, the BeOS is also accompa-
nied ... uses all of the BeOS kits, it’s a good idea to at least have an
idea of the purpose of each.
The kits of the BeOS are subject to change. As the B...
... how the many BeIDE items are organized will be
beneficial as you look at existing BeIDE example projects and as you then start to
write your own BeOS program.
The BeIDE Folders
When the BeIDE ... File
Organization
ã Examining an
Existing BeIDE
Project
ã Setting Up a New
BeIDE Project
ã HelloWorld Source
Code
2
2. BeIDE Projects
The BeOS CD-ROM includes the BeIDE...
... Operating System Zoo
ã
Mainframe operating systems
ã
Server operating systems
ã
Multiprocessor operating systems
ã
Personal computer operating systems
ã
Real-time operating systems
ã
Embedded operating ... 1
Introduction
Chapter 1
1.1 What is an operating system
1.2 History of operating systems
1.3 The operating system zoo
1.4 Computer hardware review
1.5 Operat...
... layer of process-structured OS
handles interrupts, scheduling
ã
Above that layer are sequential processes
8
Implementation of Processes (1)
Fields of a process table entry
9
Implementation of Processes ... 1
Processes and Threads
Chapter 2
2.1 Processes
2.2 Threads
2.3 Interprocess communication
2.4 Classical IPC problems
2.5 Scheduling
2
Processes
The Process Mod...
... 1
Deadlocks
Chapter 3
3.1. Resource
3.2. Introduction to deadlocks
3.3. The ostrich algorithm
3.4. Deadlock detection and ... same time another process holds B and requests A
both are blocked and remain so
3
Resources (1)
ã
Deadlocks occur when
processes are granted exclusive access to devices
–
we refer to these devices ... request is denied
–
requesting process may be block...
... 1
Input/Output
Chapter 5
5.1 Principles of I/O hardware
5.2 Principles of I/O software
5.3 I/O software layers
5.4 Disks
5.5 Clocks
5.6 Character-oriented terminals
5.7 ... in the kernel
2
1
Device-Independent I/O Software (4)
Networking may involve many copies
2
2
User-Space I/O Software
Layers of the I/O system and the main
functions of each layer
2
3
Disks
Disk ... position...
... 1
File Systems
Chapter 6
6.1 Files
6.2 Directories
6.3 File system implementation
6.4 Example file systems
2
Long-term Information Storage
ã
Must store large amounts of data
ã
Information ... Link
8. Unlink
1
7
File System Implementation
A possible file system layout
1
8
Implementing Files (1)
(a) Contiguous allocation of disk space for 7 files
(b) State of the...
... Multiple Processor Systems
Chapter 8
8.1 Multiprocessors
8.2 Multicomputers
8.3 Distributed systems
Multiprocessor Systems
ã
Continuous need for faster ... memory via commands
-
LOAD
-
STORE
3. Access to remote memory slower than to local
Multiprocessor Hardware (6)
(a) 256-node directory based multiprocessor
(b) Fields of 32-bit memory address
(c) ... Hardware (2)
ã
Sw...
... 1
Security
Chapter 9
9.1 The security environment
9.2 Basics of cryptography
9.3 User authentication
9.4 Attacks from inside the system
9.5 Attacks from outside the system
9.6 ... database of all logins
ã
Simple login name/password as a trap
–
security personnel notified when attacker bites
17
Operating System Security
Trojan Horses
ã
Free program made available to unsu...
... 1
Case Study 1: UNIX and LINUX
Chapter 10
10.1 History of unix
10. 2 Overview of unix
10. 3 Processes in unix
10. 4 Memory management in unix
10. 5 Input/output in unix
10. 6 The unix file system ... file system
10. 7 Security in unix
2
UNIX
The layers of a UNIX system.
Us er
Inter face
3
UNIX Utility Programs
A few of the more common UNIX utilit...
... 1
Study UNIX and LINUX
10.1 History of unix
10.2 Overview of unix
10.3 Processes in unix
10.4 Memory management in unix
10.5 Input/output in unix
10.6 The unix file system ... system
10.7 Security in unix
2
UNIX
The layers of a UNIX system.
Us er
Inter face
3
UNIX Utility Programs
A few of the more common UNIX utility programs required by POSIX
4
UNIX Ke...