1 / 20

Operating Systems Final Review: File Systems, Disk Management, Naming, and Security

This comprehensive final review covers file systems, disk management, naming, and security in operating systems. Topics include file system components, disk allocation policies, different ways to organize a name space, transaction characteristics and steps, security goals and components, network protocols, distributed file systems, and more.

brooksjason
Download Presentation

Operating Systems Final Review: File Systems, Disk Management, Naming, and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Final Review Sarah Diesburg Operating Systems CS 3430

  2. Coverage • ~70% points based on new lecture material since the last session • Non-cumulative section • ~30% points for everything • Cumulative section

  3. Coverage • Many points based on your ability to apply various principles learned in class • Especially in cumulative section • Nothing directly over coding projects

  4. File Systems and Disk Management • Definitions • File • File header

  5. File Systems and Disk Management • Short answers • File system components • Disk management, naming, protection, reliability • Ways to access a file • Sequential, random, content-based • File usage patterns

  6. File Systems and Disk Management • Short answers • Disk allocation policies • Contiguous, link-list, segment-based, indexed, multilevel indexed, hashed

  7. Naming and Directories • Definitions • i_node • Directory • Name collisions • Absolute path name • Path resolution

  8. Naming and Directories • Short answers • Different ways to organize a name space • Flat name space • Hierarchical name space • Relational name space • Contextual naming • Content-based naming

  9. Transactions and Reliability • Definitions • Metadata • fsck • Journal • Transaction • Commit • Striping

  10. Transactions and Reliability • Short answers • Characteristics of a transaction • Steps to a transaction • RAID levels

  11. Protection and Security • Definitions • Security • Protection • Access matrix • Access control list • Capability list

  12. Protection and Security • Short answers • Three goals of security • confidentiality, data integrity, system availability • Three security components • authentication, authorization, enforcement • Kerberos protocol • Public key encryption

  13. Protection and Security • Short answers • Classes of security problems • Eavesdropping, abuse of privilege, imposter, Trojan horse, salami attack, logic bomb, denial-of-service attacks

  14. Networks and Distributed Systems • Definitions • Distributed systems • Protocol • Network • Packet • Arbitration • Routing

  15. Networks and Distributed Systems • Short answers • Internet protocol • Unreliable data protocol • Transmission control protocol

  16. Networks and Distributed Systems • Short answers • Ethernet arbitration techniques • carrier sensing, collision detection, adaptive randomized waiting • Point-to-point vs. broadcast network • Aloha network

  17. Distributed File Systems • Definitions • Stateless protocol • Idempotent functions

  18. Distributed File Systems • Short answers • Design principles of NFS • NFS vs. AFS • xFS design principles • Write consistency models for NFS, AFS, and xFS

  19. Everything • CPU scheduling schemes • Deadlock resolution techniques • Demand paging algorithms • Booting sequence • Ways to access storage device • Address translation schemes

  20. Some Exam-taking Techniques • Use bullets instead of complete sentences • State what you do know and why existing methods do not work

More Related