Overview of Prof. Dr.-Ing. Jochen Schiller's Computer Systems & Telematics

undefined
P
r
o
f
.
 
D
r
.
-
I
n
g
.
 
J
o
c
h
e
n
 
S
c
h
i
l
l
e
r
C
o
m
p
u
t
e
r
 
S
y
s
t
e
m
s
 
&
 
T
e
l
e
m
a
t
i
c
s
F
r
e
i
e
 
U
n
i
v
e
r
s
i
t
ä
t
 
B
e
r
l
i
n
,
 
G
e
r
m
a
n
y
T
I
 
I
I
I
:
 
O
p
e
r
a
t
i
n
g
 
S
y
s
t
e
m
s
 
&
 
C
o
m
p
u
t
e
r
 
N
e
t
w
o
r
k
s
E
x
a
m
p
l
e
TI 3: Operating Systems and Computer Networks
C
o
n
t
e
n
t
8.
Networked Computer & Internet
9.
Host-to-Network
10.
Internetworking
11.
Transport Layer
12.
Applications
13.
Network Security
14.
E
x
a
m
p
l
e
TI 3: Operating Systems and Computer Networks
A
 
C
o
m
p
r
e
h
e
n
s
i
v
e
 
E
x
a
m
p
l
e
What happens if one presses a key on the computer?
What if that key causes an web page to be displayed?
TI 3: Operating Systems and Computer Networks
?
?
K
e
y
b
o
a
r
d
 
I
n
t
e
r
r
u
p
t
Keyboard controller raises interrupt flag
CPU interrupts execution of current process and starts Interrupt
Service Routine (ISR)
-
Unconditional jump
 
TI 3: Operating Systems and Computer Networks
K
e
y
b
o
a
r
d
 
I
n
t
e
r
r
u
p
t
 
H
a
n
d
l
i
n
g
 
ISR processes input from keyboard
-
Clears interrupt flag
-
Transfers data from device into buffer
-
Establishes owner of device
-
Triggers notification of user process
TI 3: Operating Systems and Computer Networks
I
n
 
t
h
e
 
M
e
a
n
t
i
m
e
Web browser is one of many processes running
locally
Other processes include
-
Other user processes (possibly of different users)
-
System processes implementing system
services
-
Kernel processes
TI 3: Operating Systems and Computer Networks
W
e
b
 
B
r
o
w
s
e
r
 
P
r
o
c
e
s
s
 
i
n
 
D
e
t
a
i
l
Web browser processes
Currently waiting for input
-
E.g. using 
select()
P
r
o
c
e
s
s
 
s
t
a
t
e
 
b
l
o
c
k
e
d
TI 3: Operating Systems and Computer Networks
R
e
a
c
t
i
o
n
 
t
o
 
E
x
t
e
r
n
a
l
 
E
v
e
n
t
1.
I
S
R
 
c
h
a
n
g
e
s
 
p
r
o
c
e
s
s
 
s
t
a
t
e
 
t
o
 
r
e
a
d
y
2.
S
c
h
e
d
u
l
i
n
g
 
a
l
g
o
r
i
t
h
m
 
e
v
e
n
t
u
a
l
l
y
 
c
h
a
n
g
e
s
 
p
r
o
c
e
s
s
 
s
t
a
t
e
 
t
o
 
r
u
n
n
i
n
g
TI 3: Operating Systems and Computer Networks
P
r
o
c
e
s
s
 
S
c
h
e
d
u
l
i
n
g
Scheduling is handled by variety of scheduling
algorithms
-
Non-preemptive / preemptive
-
Maximize throughput, responsiveness, etc...
Processes may have priorities
-
Priority inversion due to
 
lock on shared resources
-
Priority inheritance
TI 3: Operating Systems and Computer Networks
A (3)
B (6)
C (4)
D (5)
E (2)
W
e
b
 
B
r
o
w
s
e
r
 
P
r
o
c
e
s
s
e
s
 
E
v
e
n
t
Assume input requires web browser to display a
web page with a given URL
1.
String processing (user space)
2.
Connect to server and retrieve necessary data
(system calls)
3.
Render web page (user space)
4.
Update user interface (system calls)
TI 3: Operating Systems and Computer Networks
C
l
i
e
n
t
/
S
e
r
v
e
r
 
C
o
m
m
u
n
i
c
a
t
i
o
n
TI 3: Operating Systems and Computer Networks
GET /inst/ag-tech/index.html HTTP/1.1
Host: www.inf.fu-berlin.de
Pragma: no-cache
....
L
a
y
e
r
e
d
 
P
r
o
t
o
c
o
l
 
S
t
a
c
k
TI 3: Operating Systems and Computer Networks
I
n
t
e
r
a
c
t
i
o
n
 
B
e
t
w
e
e
n
 
N
e
t
w
o
r
k
 
L
a
y
e
r
s
Layered protocol architecture
-
Each layer uses only services of layer directly below
-
Each layer provides services to layer directly above
Protocol independence
Modularity
Data encapsulation
-
Lower layers treat upper layer packets as simple data
-
Headers contain control information for each layer
Repeated encapsulation causes overhead
TI 3: Operating Systems and Computer Networks
U
n
i
f
o
r
m
 
R
e
s
o
u
r
c
e
 
L
o
c
a
t
o
r
 
(
U
R
L
)
 
http
: Hypertext Transfer Protocol (HTTP)
-
Protocol for accessing web pages and related content
-
Implies communication over port 80 (unless other port given in URL)
 
cst.mi.fu-berlin.de
: Host name
-
Resolved to IP address via Domain Name System (DNS)
-
 
cst.mi.fu-berlin.de
 -> 160.45.117.167
 
index.html
: Local resource name
-
Protocol specific parameter
-
Handled by web server
TI 3: Operating Systems and Computer Networks
http://cst.mi.fu-berlin.de/index.html
S
e
c
u
r
i
t
y
:
 
H
T
T
P
 
o
v
e
r
 
T
L
S
/
S
S
L
HTTPS authenticates server and
establishes secure connection:
1)
Propose SSL parameters, send random number
2)
Agree to parameters, send random number
3)
Send public key certificate
4)
Conclude handshake negotiation
5)
Send random number encrypted with server’s public key
-
Client and server derive session key from all three random numbers
6)
Activate negotiated parameters
7)
Send encrypted hash over previous messages
-
Server decrypts and verifies message
8)
Activate negotiated parameters
9)
Send encrypted hash over previous messages
-
Client decrypts and verifies message
Proceed to exchange regular HTTP data over
secure channel
TI 3: Operating Systems and Computer Networks
C
o
n
n
e
c
t
i
o
n
 
S
e
t
u
p
 
/
 
T
r
a
n
s
p
o
r
t
 
L
a
y
e
r
Reliable end-to-end connection between
processes
Call to 
connect()
 initiates connection setup
TCP 3-way handshake
Connection parameters
TI 3: Operating Systems and Computer Networks
S
t
r
u
c
t
u
r
e
 
o
f
 
N
e
t
w
o
r
k
 
L
a
y
e
r
 
I
P
-
P
a
c
k
e
t
TI 3: Operating Systems and Computer Networks
Version
Hdr.Len
DiffServ
Total Length
Identifier
Flags
Fragment Offset
Protocol
Time to Live
Header Checksum
Source Address
Destination Address
Options and Padding
Data
0
3
7
15
31
IP Header
0
DF
MF
Reserved
Don‘t Fragment
More Fragments
Bit
DiffServ Codepoint
ECN
Congestion control (Explicit Congestion Notification)
QoS class
N
e
t
w
o
r
k
 
L
a
y
e
r
 
R
o
u
t
i
n
g
 
(
L
o
c
a
l
 
S
c
o
p
e
)
Globally unique per host addressing
Routers maintain tables of known networks
-
Optional route to default gateway
Subnetting implements logical structure
-
Subnet mask builds hierarchy using host part of IP address
-
Limits broadcasts
-
More efficient routing
Network topology may be part of security concept
TI 3: Operating Systems and Computer Networks
N
e
t
w
o
r
k
 
L
a
y
e
r
 
R
o
u
t
i
n
g
 
(
G
l
o
b
a
l
 
S
c
o
p
e
)
Internet organized into autonomous systems (AS)
-
Commonly, one AS per major organization
-
Peering points to exchange data between ASs
Intra-domain routing: OSPF, link state algorithm
Inter-domain routing: BGPv4, distance vector protocol
-
May involve non-technical routing choices
TI 3: Operating Systems and Computer Networks
B
a
c
k
b
o
n
e
 
s
e
r
v
i
c
e
 
p
r
o
v
i
d
e
r
 
2
C
o
n
s
u
m
e
r
I
S
P
 
1
C
o
n
s
u
m
e
r
I
S
P
 
2
L
a
r
g
e
c
o
m
p
a
n
y
S
m
a
l
l
c
o
m
p
a
n
y
 
1
S
m
a
l
l
c
o
m
p
a
n
y
 
2
P
e
e
r
i
n
g
 
p
o
i
n
t
Intra
 Domain Routing
Inter
 Domain Routing
D
a
t
a
 
L
i
n
k
 
L
a
y
e
r
 
C
o
m
m
u
n
i
c
a
t
i
o
n
 
(
L
o
c
a
l
 
S
c
o
p
e
)
Transparent communication between two directly connected
nodes
Services include: framing, error control, connection
maintenance, acknowledgements, flow control
 
TI 3: Operating Systems and Computer Networks
Version
Hdr.Len
DiffServ
Total Length
Identifier
Flags
Fragment Offset
Protocol
Time to Live
Header Checksum
Source Address
Destination Address
Options and Padding
Data
0
3
7
15
31
IP Header
0
DF
MF
Reserved
Don‘t Fragment
More Fragments
Bit
DiffServ Codepoint
ECN
Congestion control (Explicit Congestion Notification)
QoS class
E
r
r
o
r
 
D
e
t
e
c
t
i
o
n
:
 
C
y
c
l
i
c
 
R
e
d
u
n
d
a
n
c
y
 
C
h
e
c
k
 
(
C
R
C
)
Reception of a correct bit sequence:
     11 0011 1001 ÷ 1 1001 = 10 0001 (mod 2)
     
11 001
     00 0001 1001
           
1 1001
           0 0000 
= remainder
No remainder, thus the received bits 
should
 be error free
Reception of a erroneous bit sequence:
     11 1111 1000 ÷ 1 1001 = 10 1001 (mod 2)
     
11 001
     00 1101 1
        
1100 1
        0001 0000
           
1 1001
           0 1001 
= remainder 
 0
There is a remainder unequal 0, thus there was definitely a transmission error
TI 3: Operating Systems and Computer Networks
 
E
r
r
o
r
s
 
D
u
r
i
n
g
 
T
r
a
n
s
m
i
s
s
i
o
n
TI 3: Operating Systems and Computer Networks
Data
0      1      0     1      1    0     0     1      1    0     0    1      0     1     0
P
h
y
s
i
c
a
l
 
L
a
y
e
r
Packet / sequence of bits turned into physical
signal
Signal propagation depends on physical medium
(limited bandwidth, attenuation, dispersion) and
background noise
Mapping between bits and (multi-valued) symbols
Baseband transmission vs. modulation
(broadband transmission)
TI 3: Operating Systems and Computer Networks
C
l
i
e
n
t
/
S
e
r
v
e
r
 
C
o
m
m
u
n
i
c
a
t
i
o
n
TI 3: Operating Systems and Computer Networks
GET /inst/ag-tech/index.html HTTP/1.1
Host: www.inf.fu-berlin.de
Pragma: no-cache
....
A
t
 
t
h
e
 
S
e
r
v
e
r
Web server is one of many processes running
locally
Upon receiving packet, network interface
controller (NIC) will raise interrupt
Kernel will handle the packet and notify the web
server process
TI 3: Operating Systems and Computer Networks
P
r
o
c
e
s
s
i
n
g
 
o
f
 
H
T
T
P
-
G
E
T
 
R
e
q
u
e
s
t
Web server retrieves file 
inst/ag-
tech/index.html
 from local file system
System calls to access secondary storage
Kernel maps file name to data layout on disk
Web server sends data to client
TI 3: Operating Systems and Computer Networks
S
e
r
v
e
r
 
R
e
p
l
i
e
s
 
t
o
 
C
l
i
e
n
t
TI 3: Operating Systems and Computer Networks
HTTP/1.1 200 OK
Date: Fri, 16 Feb 2007 11:40:34 GMT
Server: Apache/1.3.6 (Unix)
Transfer-Encoding: chunked
Content-Type: text/html
<HTML>
Document according to HTML
</HTML>
C
l
i
e
n
t
 
D
a
t
a
 
P
r
o
c
e
s
s
i
n
g
Client host receives packet
Kernel hands data to web browser process
Web browser renders page
May have to allocate memory in the process
Finally, browser updates user interface via system
call
TI 3: Operating Systems and Computer Networks
A
 
C
o
m
p
r
e
h
e
n
s
i
v
e
 
E
x
a
m
p
l
e
TI 3: Operating Systems and Computer Networks
!
!
C
o
n
t
e
n
t
1.
Introduction and Motivation
2.
Subsystems, Interrupts and System Calls
3.
Processes
4.
Memory
5.
Scheduling
6.
I/O and File System
7.
Booting, Services, and Security
8.
Networked Computer & Internet
9.
Host-to-Network
10.
Internetworking
11.
Transport Layer
12.
Applications
13.
Network Security
14.
Example
TI 3: Operating Systems and Computer Networks
TI 3: Operating Systems and Computer Networks
Fin
Slide Note
Embed
Share

This content discusses various aspects of computer systems and telematics as taught by Prof. Dr.-Ing. Jochen Schiller at Freie Universität Berlin, Germany. It covers topics such as operating systems, computer networks, network security, and examples illustrating key concepts. The content explains processes like keyboard interrupts, interrupt service routines, and the functioning of web browsers in detail. Additionally, it provides insights into how a computer system reacts to external events.

  • Computer Systems
  • Telematics
  • Operating Systems
  • Computer Networks
  • Freie Universität Berlin

Uploaded on Oct 06, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Prof. Dr.-Ing. Jochen Schiller Computer Systems & Telematics TI III: Operating Systems & Computer Networks Example Prof. Dr.-Ing. Jochen Schiller Computer Systems & Telematics Freie Universit t Berlin, Germany TI 3: Operating Systems and Computer Networks 14.1

  2. Content 8. Networked Computer & Internet 9. Host-to-Network 10. Internetworking 11. Transport Layer 12. Applications 13. Network Security 14. Example TI 3: Operating Systems and Computer Networks 14.2

  3. A Comprehensive Example What happens if one presses a key on the computer? ? What if that key causes an web page to be displayed? ? TI 3: Operating Systems and Computer Networks 14.3

  4. Keyboard Interrupt Keyboard controller raises interrupt flag CPU interrupts execution of current process and starts Interrupt Service Routine (ISR) - Unconditional jump TI 3: Operating Systems and Computer Networks 14.4

  5. Keyboard Interrupt Handling ISR processes input from keyboard -Clears interrupt flag -Transfers data from device into buffer -Establishes owner of device -Triggers notification of user process TI 3: Operating Systems and Computer Networks 14.5

  6. In the Meantime Main Memory Processor Registers i Process index PC Web browser is one of many processes running locally Other processes include -Other user processes (possibly of different users) -System processes implementing system services -Kernel processes i Process list b h Base Limit j Other registers Context Process A Data Program (code) b Context Process B Data h Program (code) TI 3: Operating Systems and Computer Networks 14.6 Figure 2.8 Typical Process Implementation

  7. Web Browser Process in Detail Web browser processes Currently waiting for input -E.g. using select() Process state blocked TI 3: Operating Systems and Computer Networks 14.7

  8. Reaction to External Event 1. 2. ISR changes process state to ready Scheduling algorithm eventually changes process state to running 2. 1. 2. 1. TI 3: Operating Systems and Computer Networks 14.8

  9. Process Scheduling D (5) C (4) A (3) B (6) E (2) Scheduling is handled by variety of scheduling algorithms -Non-preemptive / preemptive -Maximize throughput, responsiveness, etc... Processes may have priorities -Priority inversion due to lock on shared resources -Priority inheritance TI 3: Operating Systems and Computer Networks 14.9

  10. Web Browser Processes Event Assume input requires web browser to display a web page with a given URL 1. String processing (user space) 2. Connect to server and retrieve necessary data (system calls) 3. Render web page (user space) 4. Update user interface (system calls) TI 3: Operating Systems and Computer Networks 14.10

  11. Client/Server Communication GET /inst/ag-tech/index.html HTTP/1.1 Host: www.inf.fu-berlin.de Pragma: no-cache .... TI 3: Operating Systems and Computer Networks 14.11

  12. Layered Protocol Stack Web Browser Web Server Host corres- ponding to URL TI 3: Operating Systems and Computer Networks 14.12

  13. Interaction Between Network Layers TCP UDP 4 Layered protocol architecture -Each layer uses only services of layer directly below -Each layer provides services to layer directly above Protocol independence Modularity ICMP ARP IP 3 Host-to-Network 2 NH DLH Data Link Header DLT Data Link Trailer Network Header AH PH SH TH Application Header Presentation Header Session Header Transport Header User data Data encapsulation -Lower layers treat upper layer packets as simple data -Headers contain control information for each layer Repeated encapsulation causes overhead sending AH data Application layer Application layer receiving Presentation layer Presentation layer PH data SH data Session layer Session layer Transport layer Transport layer TH data Network layer Network layer NH data DLH data DLT Data link layer Data link layer bits Physical layer Physical layer TI 3: Operating Systems and Computer Networks 14.13

  14. Uniform Resource Locator (URL) http://cst.mi.fu-berlin.de/index.html http: Hypertext Transfer Protocol (HTTP) -Protocol for accessing web pages and related content -Implies communication over port 80 (unless other port given in URL) cst.mi.fu-berlin.de: Host name -Resolved to IP address via Domain Name System (DNS) - cst.mi.fu-berlin.de -> 160.45.117.167 index.html: Local resource name -Protocol specific parameter -Handled by web server TI 3: Operating Systems and Computer Networks 14.14

  15. Security: HTTP over TLS/SSL HTTPS authenticates server and establishes secure connection: 1) 2) 3) 4) 5) Propose SSL parameters, send random number Agree to parameters, send random number Send public key certificate Conclude handshake negotiation Send random number encrypted with server s public key - Client and server derive session key from all three random numbers Activate negotiated parameters Send encrypted hash over previous messages - Server decrypts and verifies message Activate negotiated parameters Send encrypted hash over previous messages - Client decrypts and verifies message 1 2 3 6) 7) 4 5 8) 9) 6 7 8 Proceed to exchange regular HTTP data over secure channel 9 Source: Cisco Systems. Application Control Engine Module SSL Configuration Guide TI 3: Operating Systems and Computer Networks 14.15

  16. Connection Setup / Transport Layer Client Server [SYN, seq=17] [SYN, seq=39, ACK=18] Connection setup Reliable end-to-end connection between processes Call to connect() initiates connection setup TCP 3-way handshake Connection parameters [seq=18, ACK=40] [seq=53, ACK=78, data= hi ] Data transfer [seq=78, ACK=55, data= ho ] CLOSED Active open /SYN Passive open Close Close [FIN] LISTEN [ACK] SYN/SYN + ACK Send/ SYN SYN/SYN + ACK SYN_RCVD SYN_SENT ACK SYN + ACK/ACK Connection release [FIN] Close /FIN ESTABLISHED [ACK] Time wait Close /FIN FIN/ACK FIN_WAIT_1 CLOSE_WAIT FIN/ACK ACK Close /FIN FIN_WAIT_2 CLOSING LAST_ACK Timeout after two segment lifetimes ACK ACK FIN/ACK CLOSED TIME_WAIT TI 3: Operating Systems and Computer Networks 14.16

  17. Structure of Network Layer IP-Packet Congestion control (Explicit Congestion Notification) Don t Fragment Reserved More Fragments QoS class DiffServ Codepoint ECN 0 DF MF Bit 0 3 7 15 31 Version Hdr.Len DiffServ Total Length Identifier Flags Fragment Offset Time to Live Protocol Header Checksum IP Header Source Address Destination Address Options and Padding Data TI 3: Operating Systems and Computer Networks 14.17

  18. Network Layer Routing (Local Scope) Globally unique per host addressing Routers maintain tables of known networks -Optional route to default gateway Subnetting implements logical structure -Subnet mask builds hierarchy using host part of IP address -Limits broadcasts -More efficient routing Network topology may be part of security concept 160.45.114 Campus - Institute 160.45.113 Router Router 160.45.115 160.45 Campus backbone 160.45.117 Router Internet TI 3: Operating Systems and Computer Networks 14.18

  19. Network Layer Routing (Global Scope) Internet organized into autonomous systems (AS) -Commonly, one AS per major organization -Peering points to exchange data between ASs Intra-domain routing: OSPF, link state algorithm Inter-domain routing: BGPv4, distance vector protocol -May involve non-technical routing choices Inter Domain Routing Intra Domain Routing Large company Consumer ISP 1 Backbone service provider 2 Peering point Consumer ISP 2 Small company 1 Small company 2 TI 3: Operating Systems and Computer Networks 14.19

  20. Data Link Layer Communication (Local Scope) Transparent communication between two directly connected nodes Services include: framing, error control, connection maintenance, acknowledgements, flow control Don t Fragment Congestion control (Explicit Congestion Notification) Reserved More Fragments QoS class DiffServ Codepoint ECN 0 DF MF Bit 0 3 7 15 31 Version Hdr.Len DiffServ Total Length Identifier Flags Fragment Offset Time to Live Protocol Header Checksum IP Header Source Address Destination Address Options and Padding Data TI 3: Operating Systems and Computer Networks 14.20

  21. Error Detection: Cyclic Redundancy Check (CRC) Reception of a correct bit sequence: 11 0011 1001 1 1001 = 10 0001 (mod 2) 11 001 00 0001 1001 1 1001 0 0000 = remainder No remainder, thus the received bits should be error free Reception of a erroneous bit sequence: 11 1111 1000 1 1001 = 10 1001 (mod 2) 11 001 00 1101 1 1100 1 0001 0000 1 1001 0 1001 = remainder 0 There is a remainder unequal 0, thus there was definitely a transmission error TI 3: Operating Systems and Computer Networks 14.21

  22. Errors During Transmission 0 1 0 1 1 0 0 1 1 0 0 1 0 1 0 Data Signal Inter- ference Signal with inter- ference Sampling Received data 0 1 0 1 1 0 1 1 1 0 0 0 0 1 0 1 0 1 1 0 0 1 1 0 0 1 0 1 Original data Error! TI 3: Operating Systems and Computer Networks 14.22

  23. Physical Layer Wired transmission Twisted pair Wave guide Optical fibers Coaxial cable Packet / sequence of bits turned into physical signal Hz 103 105 107 109 1011 1013 1015 Micro waves Infra red Long wave Short wave Classical radio Signal propagation depends on physical medium (limited bandwidth, attenuation, dispersion) and background noise TV Visible light Wireless transmission Twisted pair Copper core Mapping between bits and (multi-valued) symbols Insulation Coaxial Baseband transmission vs. modulation (broadband transmission) Copper core InsulationShielding Insulation and mechanical protection Optical fiber LED Laser diode Glas core Protective layers TI 3: Operating Systems and Computer Networks 14.23

  24. Client/Server Communication GET /inst/ag-tech/index.html HTTP/1.1 Host: www.inf.fu-berlin.de Pragma: no-cache .... TI 3: Operating Systems and Computer Networks 14.24

  25. At the Server Main Memory Processor Registers i Process index Web server is one of many processes running locally PC i Process list b h Base Limit j Other registers Context Process A Data Program (code) b Context Process B Data h Program (code) Upon receiving packet, network interface controller (NIC) will raise interrupt Kernel will handle the packet and notify the web server process Figure 2.8 Typical Process Implementation TI 3: Operating Systems and Computer Networks 14.25

  26. Processing of HTTP-GET Request Web server retrieves file inst/ag- tech/index.html from local file system System calls to access secondary storage Kernel maps file name to data layout on disk Web server sends data to client TI 3: Operating Systems and Computer Networks 14.26

  27. Server Replies to Client HTTP/1.1 200 OK Date: Fri, 16 Feb 2007 11:40:34 GMT Server: Apache/1.3.6 (Unix) Transfer-Encoding: chunked Content-Type: text/html <HTML> Document according to HTML </HTML> TI 3: Operating Systems and Computer Networks 14.27

  28. Client Data Processing Client host receives packet Kernel hands data to web browser process Web browser renders page May have to allocate memory in the process Finally, browser updates user interface via system call TI 3: Operating Systems and Computer Networks 14.28

  29. A Comprehensive Example ! ! TI 3: Operating Systems and Computer Networks 14.29

  30. Content 1. Introduction and Motivation 8. Networked Computer & Internet 2. Subsystems, Interrupts and System Calls 9. Host-to-Network 3. Processes 10. Internetworking 4. Memory 11. Transport Layer 5. Scheduling 12. Applications 6. I/O and File System 13. Network Security 7. Booting, Services, and Security 14. Example TI 3: Operating Systems and Computer Networks 14.30

  31. Fin Fin TI 3: Operating Systems and Computer Networks 14.31

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#