Die Lehrveranstaltung studiert Technologien in Standard-Betriebssystemen (general-purpose operating systems) und diskutiert Techniken und Ansätze am Beispiel der Microsoft Windows NT/2000/XP-Betriebssystemfamilie. Diese Ansätze werden in Relation gesetzt zu Lösungen, die in UNIX/Mac OS X/ Linux, dem VMS-Betriebssystem und eingebetteten Systemen realisiert worden sind.
Das Windows Betriebssystem (4) | 01:21:21 | |
---|---|---|
Rückblick | 00:17:58 | |
Native Images | 00:12:40 | |
Ntdll.dll | 00:13:01 | |
Wow64 File Locations | 00:16:53 | |
Windows API Benennungskonventionen | 00:13:39 | |
Kopieren von Dateien mit Windows API | 00:13:39 |
Nebenläufige Aktivitäten (2) | 01:23:32 | |
---|---|---|
Begrüßung | 00:11:05 | |
Kernel Mode vs. User Mode | 00:10:07 | |
In den Kernel Mode gelangen | 00:07:54 | |
Interrupt Dispatching | 00:16:53 | |
Interrupt Zusammenfassung | 00:16:14 | |
APCs | 00:10:55 | |
SMP Skalierbarkeitsaufbesserung | 00:11:57 |
Advanced Windows Synchronization | 01:25:30 | |
---|---|---|
Organisatorisches | 00:13:01 | |
Hardware Abstraction Layer | 00:04:48 | |
Windows OS Design Goals | 00:14:32 | |
Subystems | 00:11:18 | |
Protection | 00:11:16 | |
DPCs | 00:13:56 | |
Critical Sections | 00:16:43 |
Scheduling and Dispatch | 01:19:47 | |
---|---|---|
Process Concept | 00:16:48 | |
Single and Multithreaded Processes | 00:08:20 | |
User Threads | 00:11:40 | |
Problems with Multithreading | 00:12:18 | |
Process and Thread Control Block | 00:18:57 | |
Schedulers | 00:11:34 |
Concurrency | 01:17:21 | |
---|---|---|
Dekker's Algorithm | 00:22:39 | |
Single and Multithreaded Processes | 00:15:25 | |
Round Robin | 00:09:34 | |
Priority Scheduling | 00:11:29 | |
Starvation | 00:19:14 |
Advanced Windows Thread Scheduling | 01:10:45 | |
---|---|---|
How does Win Scheduler relate | 00:12:59 | |
Scheduling | 00:12:26 | |
Special Thread Priorities | 00:10:49 | |
Scheduling Scenarios | 00:15:35 | |
Priority Boosting | 00:18:45 |
Scheduling and Dispatch (2) | 01:15:43 | |
---|---|---|
Review | 00:15:41 | |
Other Thread States | 00:14:05 | |
Hard Affinity | 00:17:05 | |
Dispatcher Database | 00:12:31 | |
SMT Parking Operation | 00:16:21 |
Scheduling and Dispatch (3) | 01:25:58 | |
---|---|---|
Quiz | 00:17:39 | |
Per-Process Data | 00:10:51 | |
Process and Thread Identifiers | 00:17:22 | |
Jobs | 00:12:38 | |
Thread Block | 00:15:35 | |
If executable has no Windows format... | 00:11:53 |
Nebenläufige Aktivitäten | 01:12:53 | |
---|---|---|
Einführung | 00:15:05 | |
Problemlösung | 00:15:09 | |
Dekkers Algorithmus | 00:16:58 | |
Synchronisations-Hardware | 00:14:11 | |
Implementierung | 00:12:31 |
Memory Management for Multiprogramming | 01:15:56 | |
---|---|---|
Address Space | 00:10:10 | |
Paging | 00:20:49 | |
Hashed Page Tables | 00:10:57 | |
Intel 30386 Address Translation | 00:13:26 | |
I/O Support | 00:15:21 | |
Memory Manager Services | 00:05:13 |
Windows Memory Management Fundamentals | 01:26:24 | |
---|---|---|
Windows Memory Management Fundamentals | 00:15:37 | |
Reserving Commiting Memory | 00:16:00 | |
Managing Physical Memory | 00:06:31 | |
Paging Dynamics | 00:12:23 | |
Working Set Management | 00:06:25 | |
Shared Memory | 00:19:00 | |
Large Pages | 00:10:28 |
Windows Memory Allocation APIs | 01:28:12 | |
---|---|---|
Windows Memory Allocation APIs | 00:10:47 | |
Windows API Memory Management Architecture | 00:13:03 | |
Virtual Memory Concepts | 00:17:11 | |
X86 Address Translation | 00:26:21 | |
Physical Memory Management | 00:10:50 |
Virtual Address Translation | 01:31:58 | |
---|---|---|
Review | 00:15:06 | |
Working Set | 00:18:32 | |
Paging Dynamics | 00:12:04 | |
System Working Set | 00:18:41 | |
Page Files | 00:11:13 | |
Quiz | 00:16:22 |
Memory Management | 01:13:20 | |
---|---|---|
Memory Management Principles | 00:18:35 | |
Memory Allocation Schemes | 00:07:58 | |
Swappimg | 00:07:39 | |
Segmentation | 00:09:51 | |
Paging | 00:23:59 | |
Effective Access Time with TLB | 00:05:18 |
Windows Security Components and Concepts | 01:28:10 | |
---|---|---|
Windows Security Mechanisms | 00:18:50 | |
Kerberos Authentification Service | 00:08:52 | |
Needham-Schröder Algorithm | 00:08:55 | |
Kerberos Principles | 00:10:40 | |
Protecting Objects | 00:05:47 | |
Security Identifiers - SIDs | 00:20:44 | |
Access Special Classes | 00:14:22 |
The Security Problem | 01:24:43 | |
---|---|---|
The Kernel | 00:16:04 | |
Security Problem | 00:15:46 | |
Solving the Security Problem | 00:13:29 | |
Windows Certification | 00:14:29 | |
Local Security Authority | 00:11:51 | |
LSASS Komponenten | 00:13:04 |
Sockets Programming | 01:25:58 | |
---|---|---|
Organisation und Rückblick | 00:10:16 | |
Windows Sockets | 00:12:54 | |
Methoden | 00:16:52 | |
Praktisches Beispiel | 00:22:21 | |
Zusatzinformationen zu Sockets | 00:06:27 | |
Felix von Leitner - Scalable Network Programming | 00:17:08 |
Networking Components in Windows | 01:21:25 | |
---|---|---|
Protocols | 00:15:34 | |
Layers in the OSI Model | 00:17:56 | |
Domains | 00:15:39 | |
RPC | 00:12:16 | |
File System Access | 00:20:01 |
Das Windows Betriebssystem | 01:25:44 | |
---|---|---|
Start | 00:00:00 | |
Design Ziele | 00:00:00 | |
Kernel-Mode Komponenten | 00:00:00 | |
Kernel-Mode Device Drivers | 00:00:00 | |
SMP Skalierbarkeit | 00:00:00 | |
Linux Kern | 00:00:00 |
Das Windows Betriebssystem (2) | 01:27:20 | |
---|---|---|
Korrektur | 00:13:23 | |
Subsystem Konzept | 00:32:30 | |
Windows Subsystem | 00:45:49 | |
64-bit vs. 32-bit APIs | 00:59:59 | |
Prozesse und Threads | 01:20:21 | |
Prozess und seine Ressourcen | 01:27:20 |
Das Windows Betriebssystem (3) | 01:25:09 | |
---|---|---|
Begrüßung | 00:18:30 | |
Kernel Speicher | 00:30:34 | |
Lookaside Lists | 00:44:17 | |
System Startup Prozess | 01:00:13 | |
Objekte und Handles | 01:15:28 | |
Exceptions | 01:25:09 |
Einführung | 01:25:26 | |
---|---|---|
Organization | 00:14:37 | |
Overview of Operating Systems | 00:19:42 | |
Operating systems as hardware extension | 00:10:55 | |
Concept of Operating Systems | 00:11:37 | |
Structure of Operating Systmes | 00:18:42 | |
Basic Concepts | 00:11:08 |