SlideShare uma empresa Scribd logo
1 de 64
Chapter 22:  Windows XP
Module 22:  Windows XP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Windows XP  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History ,[object Object],[object Object]
Design Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Design Principles (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
XP Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object]
Depiction of XP Architecture
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Components — Kernel
Kernel — Process and Threads ,[object Object],[object Object],[object Object],[object Object]
Kernel — Scheduling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Kernel — Scheduling (Cont.)  ,[object Object],[object Object],[object Object]
Windows XP Interrupt Request Levels
Kernel — Trap Handling ,[object Object],[object Object],[object Object],[object Object]
Executive — Object Manager ,[object Object],[object Object],[object Object],[object Object],[object Object]
Executive — Naming Objects ,[object Object],[object Object],[object Object],[object Object],[object Object]
Executive — Virtual Memory Manager ,[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual-Memory Layout
Virtual Memory Manager (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual-to-Physical Address Translation ,[object Object]
Page File Page-Table Entry 5 bits for page protection, 20 bits for page frame address, 4 bits to select a paging file, and 3 bits that describe the page state.  V = 0
Executive — Process Manager ,[object Object],[object Object]
Executive — Local Procedure Call Facility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Executive — I/O Manager ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
File I/O
Executive — Security Reference Monitor ,[object Object],[object Object]
Executive – Plug-and-Play Manager ,[object Object],[object Object],[object Object]
Environmental Subsystems ,[object Object],[object Object],[object Object],[object Object]
Environmental Subsystems (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Environmental Subsystems (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
File System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
File System — Internal Layout ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
File System — Recovery ,[object Object],[object Object],[object Object],[object Object]
File System — Recovery (Cont.) ,[object Object],[object Object],[object Object]
File System — Security ,[object Object],[object Object],[object Object]
Volume Management and Fault Tolerance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Volume Set On Two Drives
Stripe Set on Two Drives
Stripe Set With Parity on Three Drives
Mirror Set on Two Drives
File System — Compression ,[object Object],[object Object],[object Object],[object Object],[object Object]
File System — Reparse Points ,[object Object],[object Object],[object Object]
Networking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Networking — Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Networking — Protocols (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Networking — Protocols (Cont.) ,[object Object],[object Object]
Networking — Dist. Processing Mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object]
Distributed Processing Mechanisms (Cont.) ,[object Object],[object Object],[object Object]
Networking — Redirectors and Servers ,[object Object],[object Object],[object Object]
Access to a Remote File ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access to a Remote File (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Networking — Domains ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Name Resolution in  TCP/IP  Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Name Resolution (Cont.) ,[object Object],[object Object]
Programmer Interface — Access to Kernel Obj. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Programmer Interface — Process Management ,[object Object],[object Object],[object Object]
Process Management (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Management (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Process Management (Cont.) ,[object Object],[object Object],[object Object]
Programmer Interface — Interprocess Comm. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Programmer Interface — Memory Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Memory Management (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
End of Chapter 22

Mais conteúdo relacionado

Mais procurados

Microprogram Control
Microprogram Control Microprogram Control
Microprogram Control
Anuj Modi
 
Synchronization linux
Synchronization linuxSynchronization linux
Synchronization linux
Susant Sahani
 

Mais procurados (20)

Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Microprogram Control
Microprogram Control Microprogram Control
Microprogram Control
 
Know the UNIX Commands
Know the UNIX CommandsKnow the UNIX Commands
Know the UNIX Commands
 
Synchronization linux
Synchronization linuxSynchronization linux
Synchronization linux
 
Linux Memory Management
Linux Memory ManagementLinux Memory Management
Linux Memory Management
 
Operating System 2
Operating System 2Operating System 2
Operating System 2
 
File management
File managementFile management
File management
 
Case study windows
Case study windowsCase study windows
Case study windows
 
Storage Management in Linux OS.ppt
Storage Management in Linux OS.pptStorage Management in Linux OS.ppt
Storage Management in Linux OS.ppt
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
11. dfs
11. dfs11. dfs
11. dfs
 
Control Unit Design
Control Unit DesignControl Unit Design
Control Unit Design
 
File system structure
File system structureFile system structure
File system structure
 
Point to point interconnect
Point to point interconnectPoint to point interconnect
Point to point interconnect
 
Windows Vista
Windows VistaWindows Vista
Windows Vista
 
Microprogrammed Control Unit
Microprogrammed Control UnitMicroprogrammed Control Unit
Microprogrammed Control Unit
 
Microkernel
MicrokernelMicrokernel
Microkernel
 
Concurrency
ConcurrencyConcurrency
Concurrency
 
Computer architecture control unit
Computer architecture control unitComputer architecture control unit
Computer architecture control unit
 
Frame buffer
Frame bufferFrame buffer
Frame buffer
 

Semelhante a Chapter 22 - Windows XP (20)

Windows 2000
Windows 2000Windows 2000
Windows 2000
 
OSCh21
OSCh21OSCh21
OSCh21
 
OS_Ch21
OS_Ch21OS_Ch21
OS_Ch21
 
Ch21 OS
Ch21 OSCh21 OS
Ch21 OS
 
Windows XP operating system
Windows XP operating systemWindows XP operating system
Windows XP operating system
 
Windows Operating system notes taken from somewhere
Windows Operating system notes taken from somewhereWindows Operating system notes taken from somewhere
Windows Operating system notes taken from somewhere
 
Os file
Os fileOs file
Os file
 
System components of windows xp
System components of windows xpSystem components of windows xp
System components of windows xp
 
Studies
StudiesStudies
Studies
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
Linux internal
Linux internalLinux internal
Linux internal
 
Io sy.stemppt
Io sy.stempptIo sy.stemppt
Io sy.stemppt
 
App A
App AApp A
App A
 
Visual comparison of Unix-like systems & Virtualisation
Visual comparison of Unix-like systems & VirtualisationVisual comparison of Unix-like systems & Virtualisation
Visual comparison of Unix-like systems & Virtualisation
 
Lecture 3,4 operating systems
Lecture 3,4   operating systemsLecture 3,4   operating systems
Lecture 3,4 operating systems
 
Lecture 3,4 operating systems
Lecture 3,4   operating systemsLecture 3,4   operating systems
Lecture 3,4 operating systems
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
 
OSCh3
OSCh3OSCh3
OSCh3
 
OS_Ch3
OS_Ch3OS_Ch3
OS_Ch3
 

Mais de Wayne Jones Jnr (20)

Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Ch25
Ch25Ch25
Ch25
 
Ch24
Ch24Ch24
Ch24
 
Ch23
Ch23Ch23
Ch23
 
Ch22
Ch22Ch22
Ch22
 
Ch21
Ch21Ch21
Ch21
 
Ch20
Ch20Ch20
Ch20
 
Ch19
Ch19Ch19
Ch19
 
Ch18
Ch18Ch18
Ch18
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch15
Ch15Ch15
Ch15
 
Ch14
Ch14Ch14
Ch14
 
Ch13
Ch13Ch13
Ch13
 
Ch12
Ch12Ch12
Ch12
 
Ch10
Ch10Ch10
Ch10
 
Ch09
Ch09Ch09
Ch09
 
Ch08
Ch08Ch08
Ch08
 
Ch07
Ch07Ch07
Ch07
 
Ch06
Ch06Ch06
Ch06
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Chapter 22 - Windows XP