Final Review Mark Stanovich Operating Systems COP 4610

Preview:

Citation preview

Final Review

Mark Stanovich

Operating Systems

COP 4610

Coverage

Total: 70 points; just under 2 min / point

50 points based on lectures, project 3 20 points for everything 13 bonus points

Coverage

Many points based on your ability to apply various principles learned in class Especially in cumulative section

Remember, to receive a passing grade for the overall course, you must at least earn a passing grade on the final exam and a passing grade on the projects

Device Management

Definitions–Polling/interrupts/DMA/double

buffering–Device controller/device driver–Memory-mapped I/O–Disk-related terms–Disk measurement metrics

Device Management

Short answers–Categories of I/O devices–Ways to access a device–Disk arm scheduling policies– Latency and bandwidth computations

File Systems and Disk Management

Definitions File File header

File Systems and Disk Management

Short answers File system components

Disk management, naming, protection, reliability

Ways to access a file Sequential, random, content-based

File usage patterns

File Systems and Disk Management

Short answers Disk allocation policies

Contiguous, link-list, segment-based, indexed, multilevel indexed, hashed

Naming and Directories

Definitions i_node Directory Name collisions Absolute path name Path resolution

Naming and Directories

Short answers Different ways to organize a name space

Flat name space Hierarchical name space Relational name space Contextual naming Content-based naming

Transactions and Reliability

Definitions Metadata Log Raid levels• Striping• Mirroring• ECC• Parity

Transactions and Reliability

Short answers Characteristics of a transaction Steps to a transaction RAID levels

Protection and Security

Definitions Security Protection Access matrix Access control list Capability list

Protection and Security

Short answers Three goals of security

confidentiality, data integrity, system availability

Three security components authentication, authorization, enforcement

Kerberos protocol Public key encryption

Protection and Security

Short answers Classes of security problems

Eavesdropping, abuse of privilege, imposter, Trojan horse, salami attack, logic bomb, denial-of-service attacks

Network Protocols

Definitions Protocols Port Byzantine uncertainty Two-phase commit

Network Protocols

Short answers Internet protocol Unreliable data protocol Transmission control protocol

Networks and Distributed Systems

Definitions Distributed systems Protocol Network Packet Arbitration Routing

Networks and Distributed Systems

Short answers Ethernet arbitration techniques

carrier sensing, collision detection, adaptive randomized waiting

Point-to-point vs. broadcast network Aloha network

RPC and Distributed FS

Definitions Location transparency Procedure stubs Stateless protocol Idempotent functions

RPC and Distributed FS

Short answers Differences of RPC vs. procedure calls Advantages of using RPC for IPC Design principles of NFS NFS vs. AFS xFS design principles Consistency for NFS, AFS, and xFS

Real-Time Systems

Perioidic task workload model Execution time–Causes for variations–Worst-case execution time

Common Scheduling Algorithms Schedulability Analysis

Real-Time Systems

Preemptive vs non-preemptive Priority Inversion–Examples

Project 3

Short answers Steps to obtain the content of a FAT entry

Everything

CPU-IO scheduling schemes Deadlock resolution techniques Demand paging algorithms Booting sequence Ways to access storage device Address translation schemes

Some Exam-taking Techniques

Use bullets instead of complete sentences

State what you do know and why existing methods do not work