Вы находитесь на странице: 1из 10

Z04_STAL6329_06_SE_GLOS.

QXD 2/28/08 3:20 AM Page 785

GLOSSARY
access method The method that is used to block (1) A collection of contiguous records
find a file, a record, or a set of records. that are recorded as a unit; the units are
address space The range of addresses avail- separated by interblock gaps. (2) A
able to a computer program. group of bits that are transmitted as a
address translator A functional unit that unit.
transforms virtual addresses to real busy waiting The repeated execution of a
addresses. loop of code while waiting for an event
application programming interface (API) to occur.
A standardized library of program-
ming tools used by software develop- cache memory A memory that is smaller
ers to write applications that are and faster than main memory and that
compatible with a specific operating is interposed between the processor and
system or graphic user interface. main memory.The cache acts as a buffer
asynchronous operation An operation that for recently used memory locations.
occurs without a regular or predictable central processing unit (CPU) That por-
time relationship to a specified event, tion of a computer that fetches and
for example, the calling of an error executes instructions. It consists of an
diagnostic routine that may receive Arithmetic and Logic Unit (ALU), a
control at any time during the execu- control unit, and registers. Often sim-
tion of a computer program. ply referred to as a processor.
chained list A list in which data items may
base address An address that is used as the be dispersed but in which each item
origin in the calculation of addresses in contains an identifier for locating the
the execution of a computer program. next item.
batch processing Pertaining to the tech- client A process that requests services by
nique of executing a set of computer sending messages to server processes.
programs such that each is completed cluster A group of interconnected, whole
before the next program of the set is computers working together as a unified
started. computing resource that can create the
Beowulf Defines a class of clustered com- illusion of being one machine. The term
puting that focuses on minimizing the whole computer means a system that can
price-to-performance ratio of the over- run on its own, apart from the cluster.
all system without compromising its communications architecture The hard-
ability to perform the computation ware and software structure that imple-
work for which it is being built. Most ments the communications function.
Beowulf systems are implemented on compaction A technique used when mem-
Linux computers. ory is divided into variable-size parti-
binary semaphore A semaphore that takes tions. From time to time, the operating
on only the values 0 and 1. A binary system shifts the partitions so that they
semaphore allows only one process or are contiguous and so that all of the
thread to have access to a shared criti- free memory is together in one block.
cal resource at a time. See external fragmentation.

785
Z04_STAL6329_06_SE_GLOS.QXD 2/28/08 3:20 AM Page 786

786 GLOSSARY

concurrent Pertaining to processes or the operating system tests for dead-


threads that take place within a com- lock.
mon interval of time during which they deadlock prevention A technique that
may have to alternately share common guarantees that a deadlock will not
resources. occur. Prevention is achieved by assur-
consumable resource A resource that can be ing that one of the necessary condi-
created (produced) and destroyed (con- tions for deadlock is not met.
sumed). When a resource is acquired by demand paging The transfer of a page
a process, the resource ceases to exist. from secondary memory to main mem-
Examples of consumable resources are ory storage at the moment of need.
interrupts, signals, messages, and infor- Compare prepaging.
mation in I/O buffers. device driver An operating system module
critical section In an asynchronous proce- (usually in the kernel) that deals
dure of a computer program, a part directly with a device or I/O module.
that cannot be executed simultane- direct access The capability to obtain data
ously with an associated critical section from a storage device or to enter data
of another asynchronous procedure. into a storage device in a sequence
See mutual exclusion. independent of their relative position,
by means of addresses that indicate the
database A collection of interrelated data, physical location of the data.
often with controlled redundancy, direct memory access (DMA) A form of
organized according to a schema to I/O in which a special module, called a
serve one or more applications; the DMA module, controls the exchange
data are stored so that they can be of data between main memory and an
used by different programs without I/O device. The processor sends a
concern for the data structure or orga- request for the transfer of a block of
nization. A common approach is used data to the DMA module and is inter-
to add new data and to modify and rupted only after the entire block has
retrieve existing data. been transferred.
deadlock (1) An impasse that occurs when disabled interrupt A condition, usually cre-
multiple processes are waiting for the ated by the operating system, during
availability of a resource that will not which the processor will ignore inter-
become available because it is being rupt request signals of a specified class.
held by another process that is in a disk allocation table A table that indicates
similar wait state. (2) An impasse that which blocks on secondary storage are
occurs when multiple processes are free and available for allocation to files.
waiting for an action by or a response disk cache A buffer, usually kept in main
from another process that is in a simi- memory, that functions as a cache of
lar wait state. disk blocks between disk memory and
deadlock avoidance A dynamic technique the rest of main memory.
that examines each new resource dispatch To allocate time on a processor to
request for deadlock. If the new jobs or tasks that are ready for execu-
request could lead to a deadlock, then tion.
the request is denied. distributed operating system A common
deadlock detection A technique in which operating system shared by a network
requested resources are always of computers. The distributed operating
granted when available. Periodically, system provides support for inter-
Z04_STAL6329_06_SE_GLOS.QXD 2/28/08 3:20 AM Page 787

GLOSSARY 787
process communication, process migra- first come first served (FCFS) Same as
tion, mutual exclusion, and the preven- FIFO.
tion or detection of deadlock. first in first out (FIFO) A queuing tech-
dynamic relocation A process that assigns nique in which the next item to be
new absolute addresses to a computer retrieved is the item that has been in
program during execution so that the the queue for the longest time.
program may be executed from a dif- frame In paged virtual storage, a fixed length
ferent area of main storage. block of main memory that is used to
hold one page of virtual memory.
enabled interrupt A condition, usually cre-
ated by the operating system, during gang scheduling The scheduling of a set of
which the processor will respond to related threads to run on a set of
interrupt request signals of a specified processors at the same time, on a one-
class. to-one basis.
encryption The conversion of plain text or
data into unintelligible form by means hash file A file in which records are
of a reversible mathematical computa- accessed according to the values of a
tion. key field. Hashing is used to locate a
execution context Same as process state. record on the basis of its key value.
external fragmentation Occurs when mem- hashing The selection of a storage location
ory is divided into variable-size parti- for an item of data by calculating the
tions corresponding to the blocks of address as a function of the contents of
data assigned to the memory (e. g., seg- the data. This technique complicates
ments in main memory). As segments the storage allocation function but
are moved into and out of the memory, results in rapid random retrieval.
gaps will occur between the occupied hit ratio In a two-level memory, the fraction
portions of memory. of all memory accesses that are found in
the faster memory (e. g., the cache).
field (1) Defined logical data that is part of
a record. (2) The elementary unit of a indexed access Pertaining to the organiza-
record that may contain a data item, a tion and accessing of the records of a
data aggregate, a pointer, or a link. storage structure through a separate
file A set of related records treated as a unit. index to the locations of the stored
file allocation table (FAT) A table that records.
indicates the physical location on sec- indexed file A file in which records are
ondary storage of the space allocated accessed according to the value of key
to a file. There is one file allocation fields. An index is required that indi-
table for each file. cates the location of each record on the
file management system A set of system basis of each key value.
software that provides services to users indexed sequential access Pertaining to the
and applications in the use of files, organization and accessing of the
including file access, directory mainte- records of a storage structure through
nance, and access control. an index of the keys that are stored in
file organization The physical order of arbitrarily partitioned sequential files.
records in a file, as determined by the indexed sequential file A file in which
access method used to store and records are ordered according to the
retrieve them. values of a key field. The main file is
Z04_STAL6329_06_SE_GLOS.QXD 2/28/08 3:20 AM Page 788

788 GLOSSARY

supplemented with an index file that kernel mode A privileged mode of execu-
contains a partial list of key values; the tion reserved for the kernel of the
index provides a lookup capability to operating system. Typically, kernel
reach quickly reach the vicinity of a mode allows access to regions of main
desired record. memory that are unavailable to
instruction cycle The time period during processes executing in a less-privileged
which one instruction is fetched from mode, and also enables execution of
memory and executed when a com- certain machine instructions that are
puter is given an instruction in restricted to the kernel mode. Also
machine language. referred to as system mode or
internal fragmentation Occurs when mem- privileged mode.
ory is divided into fixed-size partitions
(e. g., page frames in main memory, last in first out (LIFO) A queuing tech-
physical blocks on disk). If a block of nique in which the next item to be
data is assigned to one or more parti- retrieved is the item most recently
tions, then there may be wasted space placed in the queue.
in the last partition. This will occur if lightweight process A thread.
the last portion of data is smaller than livelock A condition in which two or more
the last partition. processes continuously change their
interrupt A suspension of a process, such state in response to changes in the
as the execution of a computer pro- other process(es) without doing any
gram, caused by an event external to useful work. This is similar to deadlock
that process and performed in such a in that no progress is made but differs
way that the process can be resumed. in that neither process is blocked or
interrupt handler A routine, generally part waiting for anything.
of the operating system. When an inter- locality of reference The tendency of a
rupt occurs, control is transferred to the processor to access the same set of
corresponding interrupt handler, which memory locations repetitively over a
take some action in response to the short period of time.
condition that caused the interrupt. logical address A reference to a memory
location independent of the current
job A set of computational steps packaged assignment of data to memory. A
to run as a unit. translation must be made to a physical
job control language (JCL) A problem- address before the memory access can
oriented language that is designed to be achieved.
express statements in a job that are logical record A record independent of its
used to identify the job or to describe its physical environment; portions of one
requirements to an operating system. logical record may be located in differ-
ent physical records or several logical
kernel A portion of the operating system records or parts of logical records may
that includes the most heavily used be located in one physical record.
portions of software. Generally, the
kernel is maintained permanently in macrokernel A large operating system core
main memory. The kernel runs in a that provides a wide range of services.
privileged mode and responds to calls mailbox A data structure shared among a
from processes and interrupts from number of processes that is used as a
devices. queue for messages. Messages are sent
Z04_STAL6329_06_SE_GLOS.QXD 2/28/08 3:20 AM Page 789

GLOSSARY 789
to the mailbox and retrieved from the code within an abstract data type. The
mailbox rather than passing directly monitor’s variable may only be
from sender to receiver. accessed via its access procedures and
main memory Memory that is internal to the only one process may be actively
computer system, is program address- accessing the monitor at any one time.
able, and can be loaded into registers for The access procedures are critical sec-
subsequent execution or processing. tions. A monitor may have a queue of
malicious software Any software designed processes that are waiting to access it.
to cause damage to or use up the monolithic kernel A large kernel containing
resources of a target computer. Mali- virtually the complete operating system,
cious software (malware) is frequently including scheduling, file system, device
concealed within or masquerades as drivers, and memory management. All
legitimate software. In some cases, it the functional components of the kernel
spreads itself to other computers via e- have access to all of its internal data
mail or infected floppy disks. Types of structures and routines. Typically, a
malicious software include viruses, Tro- monolithic kernel is implemented as a
jan horses, worms, and hidden software single process, with all elements sharing
for launching denial-of-service attacks. the same address space.
memory cycle time The time it takes to multilevel security A capability that
read one word from or write one enforces access control across multiple
word to memory. This is the inverse of levels of classification of data.
the rate at which words can be read multiprocessing A mode of operation that
from or written to memory. provides for parallel processing by two
memory partitioning The subdividing of or more processors of a multiprocessor.
storage into independent sections. multiprocessor A computer that has two
message A block of information that may or more processors that have common
be exchanged between processes as a access to a main storage.
means of communication. multiprogramming A mode of operation
microkernel A small privileged operating that provides for the interleaved execu-
system core that provides process tion of two or more computer programs
scheduling, memory management, and by a single processor. The same as mul-
communication services and relies on titasking, using different terminology.
other processes to perform some of the multiprogramming level The number of
functions traditionally associated with processes that are partially or fully res-
the operating system kernel. ident in main memory.
mode switch A hardware operation that multitasking A mode of operation that pro-
occurs that causes the processor to vides for the concurrent performance or
execute in a different mode (kernel or interleaved execution of two or more
process). When the mode switches computer tasks. The same as multipro-
from process to kernel, the program gramming, using different terminology.
counter, processor status word, and mutex Similar to a binary semaphore. A key
other registers are saved. When the difference between the two is that the
mode switches from kernel to process, process that locks the mutex (sets the
this information is restored. value to zero) must be the one to unlock
monitor A programming language con- it (sets the value to 1). In contrast, it is
struct that encapsulates variables, possible for one process to lock a binary
access procedures and initialization semaphore and for another to unlock it.
Z04_STAL6329_06_SE_GLOS.QXD 2/28/08 3:20 AM Page 790

790 GLOSSARY

mutual exclusion A condition in which first-in-first-out queue, written by one


there is a set of processes, only one of process and read by another. In some
which is able to access a given resource systems, the pipe is generalized to
or perform a given function at any allow any item in the queue to be
time. See critical section. selected for consumption.
preemption Reclaiming a resource from a
nonprivileged state An execution context process before the process has finished
that does not allow sensitive hardware using it.
instructions to be executed, such as the prepaging The retrieval of pages other
halt instruction and I/O instructions. than the one demanded by a page
nonuniform memory access (NUMA) multi- fault. The hope is that the additional
processor A shared-memory multi- pages will be needed in the near future,
processor in which the access time conserving disk I/O. Compare demand
from a given processor to a word in paging.
memory varies with the location of the priority inversion A circumstance in which
memory word. the operating system forces a higher-
priority task to wait for a lower-prior-
object request broker An entity in an ity task.
object-oriented system that acts as an privileged instruction An instruction that
intermediary for requests sent from a can be executed only in a specific mode,
client to a server. usually by a supervisory program.
operating system Software that controls privileged mode Same as kernel mode.
the execution of programs and that process A program in execution. A
provides services such as resource allo- process is controlled and scheduled by
cation, scheduling, input/output con- the operating system. Same as task.
trol, and data management. process control block The manifestation of
a process in an operating system. It is a
page In virtual storage, a fixed length data structure containing information
block that has a virtual address and about the characteristics and state of
that is transferred as a unit between the process.
main memory and secondary memory. process descriptor Same as process control
page fault Occurs when the page contain- block.
ing a referenced word is not in main process image All of the ingredients of a
memory. This causes an interrupt and process, including program, data, stack,
requires that the proper page be and process control block.
brought into main memory. process migration The transfer of a suffi-
page frame A fixed-size contiguous block cient amount of the state of a process
of main memory used to hold a page. from one machine to another for the
paging The transfer of pages between main process to execute on the target
memory and secondary memory. machine.
physical address The absolute location of a process spawning The creation of a new
unit of data in memory (e. g., word or process by another process.
byte in main memory, block on sec- process state All of the information that the
ondary memory). operating system needs to manage a
pipe A circular buffer allowing two process and that the processor needs to
processes to communicate on the pro- properly execute the process. The
ducer-consumer model. Thus, it is a process state includes the contents of
Z04_STAL6329_06_SE_GLOS.QXD 2/28/08 3:20 AM Page 791

GLOSSARY 791
the various processor registers, such as record A group of data elements treated as
the program counter and data registers; a unit.
it also includes information of use to the reentrant procedure A routine that may be
operating system, such as the priority of entered before the completion of a
the process and whether the process is prior execution of the same routine
waiting for the completion of a particu- and execute correctly.
lar I/O event. Same as execution context. registers High-speed memory internal to
process switch An operation that switches the CPU. Some registers are user visi-
the processor from one process to ble; that is, available to the program-
another, by saving all the process con- mer via the machine instruction set.
trol block, registers, and other informa- Other registers are used only by the
tion for the first and replacing them CPU, for control purposes.
with the process information for the relative address An address calculated as a
second. displacement from a base address.
processor In a computer, a functional unit remote procedure call (RPC) A technique
that interprets and executes instruc- by which two programs on different
tions. A processor consists of at least machines interact using procedure
an instruction control unit and an call/return syntax and semantics. Both
arithmetic unit. the called and calling program behave
program counter Instruction address as if the partner program were running
register. on the same machine.
program status word (PSW) A register or rendezvous In message passing, a condi-
set of registers that contains condition tion in which both the sender and
codes, execution mode, and other sta- receiver of a message are blocked until
tus information that reflects the state the message is delivered.
of a process. resident Set That portion of a process that
programmed I/O A form of I/O in which the is actually in main memory at a given
CPU issues an I/O command to an I/O time. Compare working set.
module and must then wait for the oper- response time In a data system, the elapsed
ation to be complete before proceeding. time between the end of transmission of
an enquiry message and the beginning
race condition Situation in which multiple of the receipt of a response message,
processes access and manipulate shared measured at the enquiry terminal.
data with the outcome dependent on reusable resource A resource that can be
the relative timing of the processes. safely used by only one process at a
real address A physical address in main time and is not depleted by that use.
memory. Processes obtain reusable resource
real-time System An operating system that units that they later release for reuse by
must schedule and manage real-time other processes. Examples of reusable
tasks. resources include processors, I/O chan-
real-time Task A task that is executed in nels, main and secondary memory,
connection with some process or func- devices, and data structures such as
tion or set of events external to the files, databases, and semaphores.
computer system and that must meet round robin A scheduling algorithm in
one or more deadlines to interact which processes are activated in a fixed
effectively and correctly with the cyclic order; that is, all processes are in
external environment. a circular queue. A process that cannot
Z04_STAL6329_06_SE_GLOS.QXD 2/28/08 3:20 AM Page 792

792 GLOSSARY

proceed because it is waiting for some server (1) A process that responds to
event (e. g., termination of a child request from clients via messages. (2) In
process or an input/output operation) a network, a data station that provides
returns control to the scheduler. facilities to other stations; for example,
a file server, a print server, a mail server.
scheduling To select jobs or tasks that are session A collection of one or more
to be dispatched. In some operating processes that represents a single inter-
systems, other units of work, such as active user application or operating
input/output operations, may also be system function. All keyboard and
scheduled. mouse input is directed to the fore-
secondary memory Memory located out- ground session, and all output from the
side the computer system itself; that is, foreground session is directed to the
it cannot be processed directly by the display screen.
processor. It must first be copied into shell The portion of the operating system
main memory. Examples include disk that interprets interactive user com-
and tape. mands and job control language com-
segment In virtual memory, a block that mands. It functions as an interface
has a virtual address. The blocks of a between the user and the operating
program may be of unequal length and system.
may even be of dynamically varying spin lock Mutual exclusion mechanism in
lengths. which a process executes in an infinite
segmentation The division of a program or loop waiting for the value of a lock
application into segments as part of a variable to indicate availability.
virtual memory scheme. spooling The use of secondary memory as
semaphore An integer value used for sig- buffer storage to reduce processing
naling among processes. Only three delays when transferring data between
operations may be performed on a peripheral equipment and the proces-
semaphore, all of which are atomic: ini- sors of a computer.
tialize, decrement, and increment. stack An ordered list in which items are
Depending on the exact definition of appended to and deleted from the
the semaphore, the decrement opera- same end of the list, known as the top.
tion may result in the blocking of a That is, the next item appended to the
process, and the increment operation list is put on the top, and the next item
may result in the unblocking of a to be removed from the list is the item
process. Also known as a counting that has been in the list the shortest
semaphore or a general semaphore. time. This method is characterized as
sequential access The capability to enter last-in-first-out.
data into a storage device or a data starvation A condition in which a process
medium in the same sequence as the is indefinitely delayed because other
data are ordered, or to obtain data in processes are always given preference.
the same order as they were entered. strong semaphore A semaphore in which
sequential file A file in which records are all processes waiting on the same sem-
ordered according to the values of one aphore are queued and will eventually
or more key fields and processed in the proceed in the same order as they exe-
same sequence from the beginning of cuted the wait (P) operations (FIFO
the file. order).
Z04_STAL6329_06_SE_GLOS.QXD 2/28/08 3:20 AM Page 793

GLOSSARY 793
swapping A process that interchanges the time slicing A mode of operation in which
contents of an area of main storage two or more processes are assigned
with the contents of an area in sec- quanta of time on the same processor.
ondary memory. trace A sequence of instructions that are
symmetric multiprocessing (SMP) A form executed when a process is running.
of multiprocessing that allows the translation lookaside buffer (TLB) A high-
operating system to execute on any speed cache used to hold recently refer-
available processor or on several avail- enced page table entries as part of a
able processors simultaneously. paged virtual memory scheme.The TLB
synchronous operation An operation that reduces the frequency of access to main
occurs regularly or predictably with memory to retrieve page table entries.
respect to the occurrence of a specified trap An unprogrammed conditional jump
event in another process, for example, to a specified address that is automati-
the calling of an input/output routine cally activated by hardware; the loca-
that receives control at a precoded tion from which the jump was made is
location in a computer program. recorded.
synchronization Situation in which two or trap door Secret undocumented entry
more processes coordinate their activi- point into a program, used to grant
ties based on a condition. access without normal methods of
system bus A bus used to interconnect access authentication.
major computer components (CPU, trojan horse Secret undocumented routine
memory, I/O). embedded within a useful program.
system mode Same as kernel mode. Execution of the program results in
execution of the secret routine.
task Same as process. trusted system A computer and operating
thrashing A phenomenon in virtual mem- system that can be verified to imple-
ory schemes, in which the processor ment a given security policy.
spends most of its time swapping pieces
rather than executing instructions. user mode The least-privileged mode of
thread A dispatchable unit of work. It execution. Certain regions of main
includes a processor context (which memory and certain machine instruc-
includes the program counter and stack tions cannot be used in this mode.
pointer) and its own data area for a
stack (to enable subroutine branching). virus Secret undocumented routine
A thread executes sequentially and is embedded within a useful program.
interruptible so that the processor can Execution of the program results in
turn to another thread. A process may execution of the secret routine.
consist of multiple threads. virtual address The address of a storage
thread switch The act of switching proces- location in virtual memory.
sor control from one thread to another virtual memory The storage space that may
within the same process. be regarded as addressable main stor-
time sharing The concurrent use of a age by the user of a computer system in
device by a number of users. which virtual addresses are mapped
time slice The maximum amount of time into real addresses. The size of virtual
that a process can execute before being storage is limited by the addressing
interrupted. scheme of the computer system and by
Z04_STAL6329_06_SE_GLOS.QXD 2/28/08 3:20 AM Page 794

794 GLOSSARY

the amount of secondary memory avail- ated on within a given computer. Typi-
able and not by the actual number of cally, if a processor has a fixed-length
main storage locations. instruction set, then the instruction
length equals the word length.
weak semaphore A semaphore in which all working set The working set with parame-
processes waiting on the same sema- ter Δ for a process at virtual time t, W(t,
phore proceed in an unspecified order Δ), is the set of pages of that process
(i.e., the order is unknown or indeter- that have been referenced in the last Δ
minate). time units. Compare resident set.
word An ordered set of bytes or bits that is worm Program that can travel from com-
the normal unit in which information puter to computer across network con-
may be stored, transmitted, or oper- nections. May contain a virus or bacteria.

Вам также может понравиться