Download free course Operating Systems and Middleware, pdf file on 559 pages by Max Hailperin.
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the computer to save energy while you are gone. Upon returning, you boot the computer back up, open the document, and continue editing.
This scenario illustrates that computations interact. In fact, it demonstrates at least three kinds of interactions between computations. In each case, one computation provides data to another. First, your email program retrieves new mail from the server, using the Internet to bridge space. Second, your email program provides the attachment to the word processor, using the operating system's services to couple the two application pro grams. Third, the invocation of the word processor that is running before your trip provides the partially edited document to the invocation running after your return, using disk storage to bridge time.
In this book, you will learn about all three kinds of interaction. In all three cases, interesting software techniques are needed in order to bring the computations into contact, yet keep them sufficiently at arm's length that they don't compromise each other's reliability. The exciting challenge, then, is supporting controlled interaction. This includes support for computations that share a single computer and interact with one another, as your email and word processing programs do. It also includes support for data storage and network communication. This book describes how all these kinds of support are provided both by operating systems and by additional software layered on top of operating systems, which is known as middleware.
Table of contents
Introduction
Threads
Scheduling
Synchronization and Deadlocks
Atomic Transactions
Virtual Memory
Processes and Protection
Files and Other Persistent Storage
Networking
Messaging, RPC, and Web Services
Security
Stacks
Pages :
559
Size :
8.8 MB
File type :
PDF
Downloads:
80
Created:
2022-02-03
License:
CC BY-SA
Author(s):
Max Hailperin
Warning: Trying to access array offset on false in /home/tutovnfz/public_html/article.php on line 233
This is a free Raspberry PI PDF tutorial in 12 chapters and 43 pages.
In this guide you’ll find everything you need to know about the Raspberry Pi computer, its background, purpose, system specs, the software it runs and the amazing things it is capable of. ...
This tutorial is for people who want to learn to the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE you attempted doing anything documented here....
Test-driven development (TDD) is a proven way to find software bugs early. Writing tests b..., download free Testing tutorial in PDF (218 pages) created by Dr. Dominik Hauser ....