Final Review Andy Wang Operating Systems COP 4610

  • Slides: 21
Download presentation
Final Review Andy Wang Operating Systems COP 4610 / CGS 5765

Final Review Andy Wang Operating Systems COP 4610 / CGS 5765

Coverage n n n Total: 72 points; 1 min / point 50 points based

Coverage n n n Total: 72 points; 1 min / point 50 points based on lectures 29 -44, assignment 9, and project 3 22 points for everything ¡ 11 points based on your ability to apply various principles learned in the class

File Systems and Disk Management n Definitions ¡ ¡ File header

File Systems and Disk Management n Definitions ¡ ¡ File header

File Systems and Disk Management n Short answers ¡ File system components n ¡

File Systems and Disk Management n Short answers ¡ File system components n ¡ Ways to access a file n ¡ Disk management, naming, protection, reliability Sequential, random, content-based File usage patterns

File Systems and Disk Management n Short answers ¡ Disk allocation policies n Contiguous,

File Systems and Disk Management n Short answers ¡ Disk allocation policies n Contiguous, link-list, segment-based, indexed, multilevel indexed, hashed

Naming and Directories n Definitions ¡ ¡ ¡ i_node Directory Name collisions Absolute path

Naming and Directories n Definitions ¡ ¡ ¡ i_node Directory Name collisions Absolute path name Path resolution

Naming and Directories n Short answers ¡ Different ways to organize a name space

Naming and Directories n Short answers ¡ Different ways to organize a name space n n n Flat name space Hierarchical name space Relational name space Contextual naming Content-based naming

Transactions and Reliability n Definitions ¡ ¡ ¡ Metadata fsck Log Two-phase locking Striping

Transactions and Reliability n Definitions ¡ ¡ ¡ Metadata fsck Log Two-phase locking Striping

Transactions and Reliability n Short answers ¡ ¡ Characteristics of a transaction RAID levels

Transactions and Reliability n Short answers ¡ ¡ Characteristics of a transaction RAID levels

Protection and Security n Definitions ¡ ¡ ¡ Security Protection Access matrix Access control

Protection and Security n Definitions ¡ ¡ ¡ Security Protection Access matrix Access control list Capability list

Protection and Security n Short answers ¡ Three goals of security n ¡ Three

Protection and Security n Short answers ¡ Three goals of security n ¡ Three security components n ¡ ¡ confidentiality, data integrity, system availability authentication, authorization, enforcement Kerberos protocol Public key encryption

Protection and Security n Short answers ¡ Classes of security problems n Eavesdropping, abuse

Protection and Security n Short answers ¡ Classes of security problems n Eavesdropping, abuse of privilege, imposter, Trojan horse, salami attack, logic bomb, denial-of-service attacks

Network Protocols n Definitions ¡ ¡ Protocols Port Byzantine uncertainty Two-phase commit

Network Protocols n Definitions ¡ ¡ Protocols Port Byzantine uncertainty Two-phase commit

Network Protocols n Short answers ¡ ¡ ¡ Internet protocol Unreliable data protocol Transmission

Network Protocols n Short answers ¡ ¡ ¡ Internet protocol Unreliable data protocol Transmission control protocol

Networks and Distributed Systems n Definitions ¡ ¡ ¡ Distributed systems Network Packet Arbitration

Networks and Distributed Systems n Definitions ¡ ¡ ¡ Distributed systems Network Packet Arbitration Routing

Networks and Distributed Systems n Short answers ¡ Ethernet arbitration techniques n ¡ carrier

Networks and Distributed Systems n Short answers ¡ Ethernet arbitration techniques n ¡ carrier sensing, collision detection, adaptive randomized waiting Point-to-point vs. broadcast network

RPC and Distributed FS n Definitions ¡ ¡ ¡ Location transparency Microkernel operating systems

RPC and Distributed FS n Definitions ¡ ¡ ¡ Location transparency Microkernel operating systems Procedure stubs

RPC and Distributed FS n Short answers ¡ ¡ Advantages of using RPC for

RPC and Distributed FS n Short answers ¡ ¡ Advantages of using RPC for IPC Design principles of NFS vs. AFS x. FS design principles

Project 3 n Short answers ¡ Steps to obtain the content of a FAT

Project 3 n Short answers ¡ Steps to obtain the content of a FAT entry

Everything n n n CPU-IO scheduling schemes Deadlock resolution techniques Demand paging algorithms Booting

Everything n n n CPU-IO scheduling schemes Deadlock resolution techniques Demand paging algorithms Booting sequence Process creation Address translation schemes

Some Exam-taking Techniques n n Use bullets instead of complete sentences State what you

Some Exam-taking Techniques n n Use bullets instead of complete sentences State what you do know and why existing methods do not work