skip to main content
Skip header Section
The design of the UNIX operating systemSeptember 1986
Publisher:
  • Prentice-Hall, Inc.
  • Division of Simon and Schuster One Lake Street Upper Saddle River, NJ
  • United States
ISBN:978-0-13-201799-2
Published:01 September 1986
Pages:
471
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Meng D, Guerriero M, Machiry A, Aghakhani H, Bose P, Continella A, Kruegel C and Vigna G Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, (731-743)
  2. Yanakieva E, Youssef M, Rezae A and Bieniusa A On the Impossibility of Confidentiality, Integrity and Accessibility in Highly-Available File Systems Networked Systems, (3-18)
  3. Barbar M, Sui Y and Chen S Object versioning for flow-sensitive pointer analysis Proceedings of the 2021 IEEE/ACM International Symposium on Code Generation and Optimization, (222-235)
  4. ACM
    Katasonov A, Tcvetkov A, Polyanicheva A and Krasov A Investigation of operating system security mechanisms for vulnerabilities Proceedings of the 4th International Conference on Future Networks and Distributed Systems, (1-6)
  5. Ben Yehuda R and Zaidenberg N (2019). Protection against reverse engineering in ARM, International Journal of Information Security, 19:1, (39-51), Online publication date: 1-Feb-2020.
  6. Campello D, Lopez H, Useche L, Koller R and Rangaswami R Non-blocking writes to files Proceedings of the 13th USENIX Conference on File and Storage Technologies, (151-165)
  7. ACM
    Lafitte J (2016). Entangled-Coupling, ACM SIGARCH Computer Architecture News, 42:5, (7-15), Online publication date: 9-Dec-2014.
  8. ACM
    Fragkoulis M, Spinellis D, Louridas P and Bilas A Relational access to Unix kernel data structures Proceedings of the Ninth European Conference on Computer Systems, (1-14)
  9. ACM
    Fu Y and Lin Z (2013). Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection, ACM Transactions on Information and System Security, 16:2, (1-29), Online publication date: 1-Sep-2013.
  10. Meoni M Beyond Batch Computing on the WLCG Grid Proceedings of the 2011 IEEE/ACM 12th International Conference on Grid Computing, (207-215)
  11. ACM
    Kim J, Kho J, Hong M, Son C, Lee D, Youk S and Lee G A study on intrusion protection techniques against Linux kernel backdoor Proceedings of the 2009 International Conference on Hybrid Information Technology, (86-90)
  12. ACM
    Le-Phuoc D, Polleres A, Hauswirth M, Tummarello G and Morbidoni C Rapid prototyping of semantic mash-ups through semantic web pipes Proceedings of the 18th international conference on World wide web, (581-590)
  13. ACM
    Das S, Chattopadhayay A, Kalyani D and Saha M File-system intrusion detection by preserving MAC DTS Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, (1-6)
  14. Zhu Y and Jiang H (2008). RACE, IEEE Transactions on Computers, 57:1, (25-40), Online publication date: 1-Jan-2008.
  15. Seo M, Kim H, Maeng J, Kim J and Ryu M An effective design of master-slave operating system architecture for multiprocessor embedded systems Proceedings of the 12th Asia-Pacific conference on Advances in Computer Systems Architecture, (114-125)
  16. Tsafrir D, Etsion Y and Feitelson D Secretly monopolizing the CPU without superuser privileges Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (1-18)
  17. Doyle B and Lister R Why teach unix? Proceedings of the ninth Australasian conference on Computing education - Volume 66, (19-25)
  18. Webb A, Mansell R, Knight J, Greenspan S and Emmes D (2007). Practical software reuse for IBM System z I/O subsystems, IBM Journal of Research and Development, 51:1/2, (229-243), Online publication date: 1-Jan-2007.
  19. Cho S and Jin L Managing Distributed, Shared L2 Caches through OS-Level Page Allocation Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, (455-468)
  20. ACM
    Jin L, Lee H and Cho S A flexible data to L2 cache mapping approach for future multicore processors Proceedings of the 2006 workshop on Memory system performance and correctness, (92-101)
  21. ACM
    Robbins S (2006). A UNIX concurrent I/O simulator, ACM SIGCSE Bulletin, 38:1, (303-307), Online publication date: 31-Mar-2006.
  22. ACM
    Robbins S A UNIX concurrent I/O simulator Proceedings of the 37th SIGCSE technical symposium on Computer science education, (303-307)
  23. Zúquete A (2005). An efficient high quality random number generator for multi-programmed systems, Journal of Computer Security, 13:2, (243-263), Online publication date: 1-Mar-2005.
  24. ACM
    Androutsellis-Theotokis S and Spinellis D (2004). A survey of peer-to-peer content distribution technologies, ACM Computing Surveys, 36:4, (335-371), Online publication date: 1-Dec-2004.
  25. ACM
    Geva M and Wiseman Y (2004). A common framework for inter-process communication on a cluster, ACM SIGOPS Operating Systems Review, 38:4, (33-44), Online publication date: 1-Oct-2004.
  26. ACM
    Etsion Y, Tsafrir D and Feitelson D Desktop scheduling Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video, (110-115)
  27. Bansal S and Modha D CAR Proceedings of the 3rd USENIX conference on File and storage technologies, (14-14)
  28. Bansal S and Modha D CAR: Clock with Adaptive Replacement Proceedings of the 3rd USENIX Conference on File and Storage Technologies, (187-200)
  29. ACM
    Hansen S and Fossum T Events not equal to GUIs Proceedings of the 35th SIGCSE technical symposium on Computer science education, (378-381)
  30. ACM
    Hansen S and Fossum T (2004). Events not equal to GUIs, ACM SIGCSE Bulletin, 36:1, (378-381), Online publication date: 1-Mar-2004.
  31. Baynes K, Collins C, Fiterman E, Ganesh B, Kohout P, Smit C, Zhang T and Jacob B (2003). The Performance and Energy Consumption of Embedded Real-Time Operating Systems, IEEE Transactions on Computers, 52:11, (1454-1469), Online publication date: 1-Nov-2003.
  32. Correa W, Klosowski J and Silva C Visibility-Based Prefetching for Interactive Out-Of-Core Rendering Proceedings of the 2003 IEEE Symposium on Parallel and Large-Data Visualization and Graphics
  33. ACM
    Kohout P, Ganesh B and Jacob B Hardware support for real-time operating systems Proceedings of the 1st IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, (45-51)
  34. Megiddo N and Modha D ARC Proceedings of the 2nd USENIX conference on File and storage technologies, (9-9)
  35. Narten T and Burgess M Unix operating system Encyclopedia of Computer Science, (1816-1819)
  36. Hellerman H and Reilly E Computer system Encyclopedia of Computer Science, (425-431)
  37. ACM
    Liu J, Zheng M and Ju J (2003). Offering different services by server clusters, ACM SIGOPS Operating Systems Review, 37:1, (14-22), Online publication date: 1-Jan-2003.
  38. Choi J, Noh S, Min S, Ha E and Cho Y (2002). Design, Implementation, and Performance Evaluation of a Detection-Based Adaptive Block Replacement Scheme, IEEE Transactions on Computers, 51:7, (793-800), Online publication date: 1-Jul-2002.
  39. Momtchev M and Marquet P An Asymmetric Real-Time Scheduling for Linux Proceedings of the 16th International Parallel and Distributed Processing Symposium
  40. Lee D, Choi J, Kim J, Noh S, Min S, Cho Y and Kim C (2001). LRFU, IEEE Transactions on Computers, 50:12, (1352-1361), Online publication date: 1-Dec-2001.
  41. Lyu J, Kim Y, Kim Y and Lee I A Procedure-Based Dynamic Software Update Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), (271-284)
  42. ACM
    Hsu W, Smith A and Young H (2001). I/O reference behavior of production database workloads and the TPC benchmarks—an analysis at the logical level, ACM Transactions on Database Systems, 26:1, (96-143), Online publication date: 1-Mar-2001.
  43. ACM
    Bruschi D and Rosti E Disarming offense to facilitate defense Proceedings of the 2000 workshop on New security paradigms, (69-75)
  44. Gschwind T PSTL Proceedings of the 6th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 6, (11-11)
  45. Hess C, Ballesteros F, Campbell R and Mickunas M An adaptive data object service for pervasie computing environments Proceedings of the 6th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 6, (3-3)
  46. Somayaji A and Forrest S Automated response using system-call delays Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (14-14)
  47. ACM
    Mönkeberg A and Rakete R Three for one Proceedings of the fifth ACM workshop on Role-based access control, (83-88)
  48. Marlet R, Thibault S and Consel C (1999). Efficient Implementations of Software Architectures via Partial Evaluation, Automated Software Engineering, 6:4, (411-440), Online publication date: 1-Oct-1999.
  49. Chien A and Byun J Safe and Protected Execution for the Morph/AMRM Reconfigurable Processor Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines
  50. ACM
    Doyle E CORBA wrap interface Proceedings of the 37th annual Southeast regional conference (CD-ROM), (10-es)
  51. Sharifi M and Karimi K (1999). DIPC: The Linux Way of Distributed Programming, Linux Journal, 1999:57es, (1-es), Online publication date: 1-Jan-1999.
  52. Hori A, Tezuka H and Ishikawa Y Highly efficient gang scheduling implementation Proceedings of the 1998 ACM/IEEE conference on Supercomputing, (1-14)
  53. ACM
    Brodowicz M and Johnson O PARADISE Proceedings of the 12th international conference on Supercomputing, (220-226)
  54. Subramanian I, Mather C, Peterson K and Raghunath B Implementation of multiple pagesize support in HP-UX Proceedings of the annual conference on USENIX Annual Technical Conference, (9-9)
  55. Sidhu D and Wijesinha A (1998). Performance analysis of a constrained resource sharing system, Queueing Systems: Theory and Applications, 29:2/4, (293-311), Online publication date: 15-May-1998.
  56. Welling G and Badrinath B (1998). An Architecture for Exporting Environment Awareness to Mobile Computing Applications, IEEE Transactions on Software Engineering, 24:5, (391-400), Online publication date: 1-May-1998.
  57. Bender M, Chakrabarti S and Muthukrishnan S Flow and stretch metrics for scheduling continuous job streams Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms, (270-279)
  58. ACM
    Steere D (1997). Exploiting the non-determinism and asynchrony of set iterators to reduce aggregate file I/O latency, ACM SIGOPS Operating Systems Review, 31:5, (252-263), Online publication date: 1-Dec-1997.
  59. Keezer W Simulation of computer systems and applications Proceedings of the 29th conference on Winter simulation, (103-109)
  60. Yue K and Lilja D (1997). An Effective Processor Allocation Strategy for Multiprogrammed Shared-Memory Multiprocessors, IEEE Transactions on Parallel and Distributed Systems, 8:12, (1246-1258), Online publication date: 1-Dec-1997.
  61. ACM
    Friberg C and Held A Support for discretionary role based access control in ACL-oriented operating systems Proceedings of the second ACM workshop on Role-based access control, (83-94)
  62. ACM
    Haines M (1997). An open implementation analysis and design for lightweight threads, ACM SIGPLAN Notices, 32:10, (229-242), Online publication date: 9-Oct-1997.
  63. ACM
    Haines M An open implementation analysis and design for lightweight threads Proceedings of the 12th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (229-242)
  64. ACM
    Steere D Exploiting the non-determinism and asynchrony of set iterators to reduce aggregate file I/O latency Proceedings of the sixteenth ACM symposium on Operating systems principles, (252-263)
  65. ACM
    Vogt C (1997). Visualizing UNIX synchronization operations, ACM SIGOPS Operating Systems Review, 31:3, (52-64), Online publication date: 1-Jul-1997.
  66. Conte T, Sathaye S and Banerjia S A persistent rescheduled-page cache for low overhead object code compatibility in VLIW architectures Proceedings of the 29th annual ACM/IEEE international symposium on Microarchitecture, (4-13)
  67. ACM
    Greenwald S A new security policy for distributed resource management and access control Proceedings of the 1996 workshop on New security paradigms, (74-86)
  68. ACM
    Jacob B and Mudge T The trading function in action Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (241-247)
  69. Linux Journal Staff (1996). Kernel Korner: Dynamic Kernels - Discovery, Linux Journal, 1996:24es, (9-es), Online publication date: 1-Apr-1996.
  70. ACM
    McDonald C (1996). User-level distributed file systems projects, ACM SIGCSE Bulletin, 28:1, (333-337), Online publication date: 1-Mar-1996.
  71. ACM
    McDonald C User-level distributed file systems projects Proceedings of the twenty-seventh SIGCSE technical symposium on Computer science education, (333-337)
  72. Smith K and Seltzer M A comparison of FFS disk allocation policies Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, (2-2)
  73. ACM
    Chen J, Endo Y, Chan K, Mazieres D, Dias A, Seltzer M and Smith M (1995). The measured performance of personal computer operating systems, ACM SIGOPS Operating Systems Review, 29:5, (299-313), Online publication date: 3-Dec-1995.
  74. ACM
    Chen J, Endo Y, Chan K, Mazieres D, Dias A, Seltzer M and Smith M The measured performance of personal computer operating systems Proceedings of the fifteenth ACM symposium on Operating systems principles, (299-313)
  75. ACM
    Sane A and Campbell R (1995). Object-oriented state machines, ACM SIGPLAN Notices, 30:10, (17-32), Online publication date: 17-Oct-1995.
  76. ACM
    Sane A and Campbell R Object-oriented state machines Proceedings of the tenth annual conference on Object-oriented programming systems, languages, and applications, (17-32)
  77. Mehra P and Wah B (1995). Synthetic Workload Generation for Load-Balancing Experiments, IEEE Parallel & Distributed Technology: Systems & Technology, 3:3, (4-19), Online publication date: 1-Sep-1995.
  78. Goldman K, Swaminathan B, McCartney T, Anderson M and Sethuraman R (1995). The Programmers' Playground, IEEE Transactions on Software Engineering, 21:9, (735-746), Online publication date: 1-Sep-1995.
  79. ACM
    Castori P (1995). Semaphores revisited with MMS, ACM SIGOPS Operating Systems Review, 29:3, (49-63), Online publication date: 1-Jul-1995.
  80. Russinovich M and Segall Z Fault Tolerance for Off-the-Shelf Applications and Hardware Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
  81. ACM
    Epema D An analysis of decay-usage scheduling in multiprocessors Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, (74-85)
  82. ACM
    Epema D (1995). An analysis of decay-usage scheduling in multiprocessors, ACM SIGMETRICS Performance Evaluation Review, 23:1, (74-85), Online publication date: 1-May-1995.
  83. ACM
    Kleiman S and Eykholt J (1995). Interrupts as threads, ACM SIGOPS Operating Systems Review, 29:2, (21-26), Online publication date: 1-Apr-1995.
  84. ACM
    Pérez-Dávila A (1995). O.S. bridge between academia and reality, ACM SIGCSE Bulletin, 27:1, (146-148), Online publication date: 15-Mar-1995.
  85. ACM
    Pérez-Dávila A O.S. bridge between academia and reality Proceedings of the twenty-sixth SIGCSE technical symposium on Computer science education, (146-148)
  86. ACM
    Holt A Do disk drives dream of buffer cache hits? Proceedings of the conference on Ethics in the computer age, (188-195)
  87. Turner S, Ni L and Cheng B Time and/or space sharing in a workstation cluster environment Proceedings of the 1994 ACM/IEEE conference on Supercomputing, (630-639)
  88. Haines M, Cronk D and Mehrotra P On the design of Chant Proceedings of the 1994 ACM/IEEE conference on Supercomputing, (350-359)
  89. ACM
    Kim G and Spafford E The design and implementation of tripwire Proceedings of the 2nd ACM Conference on Computer and communications security, (18-29)
  90. ACM
    Barcellos A, Filho V, Schramm J and Geyer C (1994). The HetNOS network operating system, ACM SIGOPS Operating Systems Review, 28:4, (34-47), Online publication date: 1-Oct-1994.
  91. LeFebvre W Kernel Mucking in Top Proceedings of the 8th USENIX conference on System administration, (47-56)
  92. Malloy B, Lloyd E and Soffa M (1994). Scheduling DAG's for Asynchronous Multiprocessor Execution, IEEE Transactions on Parallel and Distributed Systems, 5:5, (498-508), Online publication date: 1-May-1994.
  93. ACM
    Hatkanagalekar P (1994). A note on structured interrupts, ACM SIGOPS Operating Systems Review, 28:2, (88-91), Online publication date: 1-Apr-1994.
  94. ACM
    Mahoney B (1994). An “open” oriented file system, ACM SIGOPS Operating Systems Review, 28:1, (48-54), Online publication date: 1-Jan-1994.
  95. Danzig P (1994). Flow Control for Limited Buffer Multicast, IEEE Transactions on Software Engineering, 20:1, (1-12), Online publication date: 1-Jan-1994.
  96. ACM
    Malloy B The validation of a multiprocessor simulator Proceedings of the 25th conference on Winter simulation, (625-631)
  97. ACM
    Bharat K and Sukaviriya P Animating user interfaces using animation servers Proceedings of the 6th annual ACM symposium on User interface software and technology, (69-79)
  98. Hellerstein J (1993). Achieving Service Rate Objectives with Decay Usage Scheduling, IEEE Transactions on Software Engineering, 19:8, (813-825), Online publication date: 1-Aug-1993.
  99. Evans S, Clarke K, Singleton D and Smaalders B Optimizing Unix resource scheduling for user interaction Proceedings of the USENIX Summer 1993 Technical Conference on Summer technical conference - Volume 1, (1-24)
  100. ACM
    Kavka C, Printista M and Gallard R (1993). Extending device management in Minix, ACM SIGOPS Operating Systems Review, 27:2, (35-43), Online publication date: 1-Apr-1993.
  101. Squiillante M and Lazowska E (1993). Using Processor-Cache Affinity Information in Shared-Memory Multiprocessor Scheduling, IEEE Transactions on Parallel and Distributed Systems, 4:2, (131-143), Online publication date: 1-Feb-1993.
  102. Grimsrud K, Archibald J and Nelson B (1993). Multiple Prefetch Adaptive Disk Caching, IEEE Transactions on Knowledge and Data Engineering, 5:1, (88-103), Online publication date: 1-Feb-1993.
  103. ACM
    Guerrero R, Leguizamon L and Gallard R (1993). Implementation and evaluation of alternative process schedulers in MINIX, ACM SIGOPS Operating Systems Review, 27:1, (79-100), Online publication date: 1-Jan-1993.
  104. Drakopoulos E and Merges M (1992). Performance Analysis of Client-Server Storage Systems, IEEE Transactions on Computers, 41:11, (1442-1452), Online publication date: 1-Nov-1992.
  105. ACM
    Torrellas J, Gupta A and Hennessy J (1992). Characterizing the caching and synchronization performance of a multiprocessor operating system, ACM SIGPLAN Notices, 27:9, (162-174), Online publication date: 1-Sep-1992.
  106. ACM
    Torrellas J, Gupta A and Hennessy J Characterizing the caching and synchronization performance of a multiprocessor operating system Proceedings of the fifth international conference on Architectural support for programming languages and operating systems, (162-174)
  107. ACM
    Geyer-Schulz A and Kolarik T (1992). Distributed computing with APL, ACM SIGAPL APL Quote Quad, 23:1, (60-69), Online publication date: 15-Jul-1992.
  108. ACM
    Geyer-Schulz A and Kolarik T Distributed computing with APL Proceedings of the international conference on APL, (60-69)
  109. Carson S and Setia S (1992). Analysis of the Periodic Update Write Policy for Disk Cache, IEEE Transactions on Software Engineering, 18:1, (44-54), Online publication date: 1-Jan-1992.
  110. Greenberg A and Wright P (1991). Design and Analysis of Master/Slave Multiprocessors, IEEE Transactions on Computers, 40:8, (963-976), Online publication date: 1-Aug-1991.
  111. ACM
    Aguirre G, Errecalde M, Guerrero R, Kavka C, Leguizamon G, Printista M and Gallard R (1991). Experiencing minix as a didactical aid for operating systems courses, ACM SIGOPS Operating Systems Review, 25:3, (32-39), Online publication date: 1-May-1991.
  112. ACM
    Kagimasa T, Takahashi K, Mori T and Yoshizumi S (1991). Adaptive storage management for very large virtual/real storage systems, ACM SIGARCH Computer Architecture News, 19:3, (372-379), Online publication date: 1-May-1991.
  113. Taheri H and Askins B Simulating the performance of a multiprocessor operating system Proceedings of the 24th annual symposium on Simulation, (81-90)
  114. ACM
    Kagimasa T, Takahashi K, Mori T and Yoshizumi S Adaptive storage management for very large virtual/real storage systems Proceedings of the 18th annual international symposium on Computer architecture, (372-379)
  115. ACM
    Taheri H and Askins B (1991). Simulating the performance of a multiprocessor operating system, ACM SIGSIM Simulation Digest, 21:3, (81-90), Online publication date: 1-Apr-1991.
  116. ACM
    Tymann P (1991). VNET: a tool for teaching computer networking to undergraduates, ACM SIGCSE Bulletin, 23:1, (21-24), Online publication date: 1-Mar-1991.
  117. ACM
    Tymann P VNET: a tool for teaching computer networking to undergraduates Proceedings of the twenty-second SIGCSE technical symposium on Computer science education, (21-24)
  118. ACM
    Chappelow S, Ackerman S and Hartley S (1990). Design and implementation of a swapper for the MINIX operating system, ACM SIGCSE Bulletin, 22:4, (55-59), Online publication date: 1-Nov-1990.
  119. ACM
    Ghosh H and Sreedhar S (1990). A comparative study of two simple network file access models, ACM SIGOPS Operating Systems Review, 24:4, (68-77), Online publication date: 1-Sep-1990.
  120. ACM
    Leach R (1990). An advanced operating systems project using concurrency, ACM SIGCSE Bulletin, 22:3, (39-ff.), Online publication date: 1-Aug-1990.
  121. ACM
    Rudolph B (1990). Self-assessment procedure XXI: a self-assessment procedure on concurrency, Communications of the ACM, 33:5, (563-576), Online publication date: 1-May-1990.
  122. ACM
    Penny J and Ashton P Laboratory-style teaching of computer science Proceedings of the twenty-first SIGCSE technical symposium on Computer science education, (192-196)
  123. ACM
    Penny J and Ashton P (1990). Laboratory-style teaching of computer science, ACM SIGCSE Bulletin, 22:1, (192-196), Online publication date: 1-Feb-1990.
  124. ACM
    Fleisch B and Popek G (1989). Mirage: a coherent distributed shared memory design, ACM SIGOPS Operating Systems Review, 23:5, (211-223), Online publication date: 1-Nov-1989.
  125. ACM
    Fleisch B and Popek G Mirage: a coherent distributed shared memory design Proceedings of the twelfth ACM symposium on Operating systems principles, (211-223)
  126. ACM
    Blusseau F BLusseau,F.-a simulation annealing and resource location in computer networks Proceedings of the 21st conference on Winter simulation, (971-979)
  127. ACM
    Bettison A, Adcock F, Chubb P, Gollan A and Maltby C LIMITS-a system for UNIX resource administration Proceedings of the 1989 ACM/IEEE conference on Supercomputing, (686-692)
  128. ACM
    Oyang Y (1989). A multiprocessor configuration in accordance with the aspects of physical and systems design, ACM SIGARCH Computer Architecture News, 17:4, (69-73), Online publication date: 2-Jun-1989.
  129. ACM
    Robbins K, Wagner N and Wenzel D (1989). Virtual rings: an introduction to concurrency, ACM SIGCSE Bulletin, 21:2, (23-28), Online publication date: 1-Jun-1989.
  130. ACM
    Braban B and Schlenk P (1989). A well structured parallel file system for PM, ACM SIGOPS Operating Systems Review, 23:2, (25-38), Online publication date: 1-Apr-1989.
  131. ACM
    Black D, Golub D, Hauth K, Tevanian A and Sanzi R (1988). The mach exception handling facility, ACM SIGPLAN Notices, 24:1, (45-56), Online publication date: 3-Jan-1989.
  132. ACM
    Black D, Golub D, Hauth K, Tevanian A and Sanzi R The mach exception handling facility Proceedings of the 1988 ACM SIGPLAN and SIGOPS workshop on Parallel and distributed debugging, (45-56)
  133. ACM
    Hogan C (1988). Protection imperfect: the security of some computing environments, ACM SIGOPS Operating Systems Review, 22:3, (7-27), Online publication date: 1-Jul-1988.
  134. ACM
    Cañas D and Esquivel L (1988). Portability and the UNIX operating system, ACM SIGOPS Operating Systems Review, 22:2, (6-23), Online publication date: 1-Apr-1988.
  135. ACM
    Kay J and Lauder P (1988). A fair share scheduler, Communications of the ACM, 31:1, (44-55), Online publication date: 1-Jan-1988.
  136. ACM
    Hagmann R Reimplementing the Cedar file system using logging and group commit Proceedings of the eleventh ACM Symposium on Operating systems principles, (155-162)
  137. ACM
    Hagmann R (1987). Reimplementing the Cedar file system using logging and group commit, ACM SIGOPS Operating Systems Review, 21:5, (155-162), Online publication date: 1-Nov-1987.
  138. Van Bulck J, Noorman J, Mühlberg J and Piessens F Secure Resource Sharing for Embedded Protected Module Architectures Information Security Theory and Practice, (71-87)
Contributors
  • Nokia Bell Labs

Recommendations

Reviews

Robert Edward Van Cleef

Advertised as the “ first ever to document the sophisticated workings of the UNIX kernel,” this book provides a readable introduction to UNIX system internals. In the Preface, the author states that the book originated in a course that he taught at AT&T Bell Laboratories; it is, therefore, no surprise that the book is ideally structured for use in a classroom environment. Chapters 1 and 2 present an overview of the UNIX operating system and a short discussion of the internal structure. The rest of the book divides into three parts: Chapters 3–5—The File System; Chapters 6–9—Process Control; and Chapters 10–13—Advanced Topics. Each part is broken down into discussions on the logical flow of the various algorithms used in the system, with a description of how they interact with each other. The algorithms are presented in a C-like pseudocode that I found easy to read and understand. Small C programs are also provided as examples of how various system calls are used. Finally, each chapter ends with a collection of exercises, including some that are “exploratory in nature, designed for investigation as a research problem.” It is the discussion of interactions between different parts of the operating system that I found to be the most interesting. Without getting into hardware-specific issues, or “exposing” AT&Ts copyrighted source to the non-licensed public, the author shows how different algorithms have been used and modified to support context switching, scheduling of priorities, interrupt handling, etc., and warns of potentially wrong assumptions about these interactions. Because of its structured format, large bibliography, and complete index, this book will also be a valuable addition to any reference library. Below is a chapter-by-chapter outline of the contents. :9N(1) General Overview of the System—History, System Structure, User Perspective, Operating System Services, Assumptions about Hardware, Summary. (2) Introduction to the Kernel—Architecture of the UNIX Operating System, Introduction to System Concepts, Kernel Data Structures, System Administration, Summary and Preview, Exercises. (3) The Buffer Cache—Buffer Headers, Structure of the Buffer Pool, Scenarios for Retrieval of a Buffer, Reading and Writing Disk Blocks, Advantages and Disadvantages of the Buffer Cache, Summary, Exercises. (4) Internal Representation of Files—Inodes, Structure of a Regular File, Directories, Conversion of a Path Name to an Inode, Super Block, Inode Assignment to a New File, Allocation of Disk Blocks, Other File Types, Summary, Exercises. (5) System Calls for the File System—Open, Read, Write, File and Record Locking, Adjusting the Position of File IO—LSEEK, Close, File Creation, Creation of Special Files, Change Directory and Change Root, Change Owner and Change Mode, Stat and Fstat, Pipes, DUP, Mounting and Unmounting File Systems, Link, Unlink, File System Abstractions, File System Maintenance, Summary, Exercises. (6) The Structure of Processes—Process States and Transitions, Layout of System Memory, The Context of a Process, Saving the Context of a Process, Manipulation of the Process Address Space, Sleep, Summary, Exercises. (7) Process Control—Process Creation, Signals, Process Termination, Awaiting Process Termination, Invoking Other Programs, The User ID of a Process, The Shell, System Boot and the Init Process, Summary, Exercises. (8) Process Scheduling and Time—Process Scheduling, Systems Calls for Time, Clock, Summary, Exercises. (9) Memory Management Policies—Swapping, Demand Paging, A Hybrid System with Swapping and Demand Paging, Summary, Exercises. (10) The IO System—Driver Interfaces, Disk Drivers, Terminal Drivers, Streams, Summary, Exercises. (11) Interprocess Communication—Process Tracing, System V IPC, Network Communications, Sockets, Summary, Exercises. (12) Multiprocessor Systems—Problem of Multiprocessor Systems, Solution with Master and Slave Processors, Solution with Semaphores, The Tunis System, Performance Limitations, Exercises. (13) Distributed UNIX Systems—Satellite Processors, The Newcastle Connection, Transparent Distributed File Systems, A Transparent Distributed Model without Stub Processes, Summary, Exercises. Also included is an appendix on System Calls, a Bibliography, and an Index.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.