CS40 Operating Systems

David Morgan
Santa Monica College
see syllabus for email address


Administrativa

Syllabus

Grade information

Course outline

Information

Stallings book's site
 8th edition
 6th edition
 5th edition

Remote Unix access with ssh

Remote Unix access with telnet (telnet is deprecated, insecure, obsolete now)

Using ftp (ftp is deprecated, insecure, obsolete. Use scp/sftp instead.)

Caching
 different types
 why it works
 chip schematic

Linux links
Linux man pages

Fundamental Unix Commands

System calls

Linux syscall cheat sheet

Disks & booting:
 - Partitioning primer
 - Linux loader doc
 - Comparative MBRs
 -Interpreting Partition Records
 - Future of BIOS

Sys. architecture
(disk organization)

Old school photos

Punched cards

1959 utility bill on punched card (like those mailed to my childhood home)

Memory mgmt:
 - Segmentation
 - Page replacement
 - Intel architecture (pdf)
 - Management types

Code relocation

Overlays
 - code composition
 - memory organization 

Threads

Deadlock example

Filesystem analysis

Files vs devices

Foundation concepts:

ASCII chart
 version 1
 version 2

Sys. architecture (interrupts)

Sys. architecture
(disk organization)

Number bases:
  -Hex tutorial
  -Hex advocacy
  -Binary numbers
  -Number systems
conversion tools:
  Table, or
  Calculator
   - binary
   - hexadecimal

 Instruction sets
   -Intel instruction set
   -Intel chip architecture

  -Others
  -CPU registers
  -a CPU instruction

An assembler program
  -source code
  -explanation 

Symbol management

Data structures
  - Datastructures
  - Linked list of states

Compile/link/load

Slide presentations

Stallings TEXTBOOK's:

Background
Ch 1 Computer Overview
Ch 2 OS Overview

Processes
Ch 3 Process
Ch 4 Threads
Ch 5 Concurrency
Ch 6 Concurrency

Memory
Ch 7 Mem Mgmt
Ch 8 Virtual Mem

Scheduling
Ch 9 Scheduling
Ch 10 Scheduling

I/O & Files
Ch 11 I/O Mgmt
Ch 12 File Mgmt


PROFESSOR's:

OS Installation

Memory Mgmt

Process Mgmt

Datastructures

Linux landscape

linux process scheduling

 

SPRING 2016
Section 4118 6:45p - 9:50p Fri Bus 263

This Website (http://homepage.smc.edu/morgan_david/)  will be used extensively to communicate with you. Announcements, grade reports, and assignments will be posted here. Please access the website from any SMC computer lab. Alternatively, it can be viewed from an internet-connected browser anywhere. You are responsible for awareness of the information posted here

Mutual exclusion - why do we need it?

integer n is shared between processes P and Q

Process P 
Account receives amount nP

Computation: n = n +nP:

P1. Load Reg_P, n
P2. Add Reg_P, nP
P3. Store Reg_P, n
Process Q 
Account receives amount nQ

Computation: n = n +nQ:

Q1. Load Reg_Q, n
Q2. Add Reg_Q, nQ
Q3. Store Reg_Q, n

what's wrong?

Some possible Interleaves of Executions of P and Q:
these 2 give the expected result n= n + nP + nQ
  P1, P2, P3, Q1, Q2, Q3
  Q1, Q2, Q3, P1, P2, P3

these 5 give erroneous result n = n+nQ
  P1, Q1, P2, Q2, P3, Q3
  P1, P2, Q1, Q2, P3, Q3
  P1, Q1, Q2, P2, P3, Q3
  Q1, P1, Q2, P2, P3, Q3
  Q1, Q2, P1, P2, P3, Q3

these 5 give erroneous result n = n + nP
  Q1, P1, Q2, P2, Q3, P3
  Q1, Q2, P1, P2, Q3, P3
  Q1, P1, P2, Q2, Q3, P3
  P1, Q1, P2, Q2, Q3, P3
  P1, P2, Q1, Q2, Q3, P3

from
http://deptinfo.unice.fr/twiki/pub/Minfo/DistributedAlgo/2015-11DistAlgo_Exmut.pptx
(4/22)

Homework
homework and reading in course outline section 8. process scheduling exercise due in your assignments subdirectory by date to-be-determined depending when we will have covered the material in class.. (4/22)

Photos of old school computer consoles and punch card equipment. (4/22)

Demonstration programs for unix process mechanism "fork/exec" - If you wish to examine or experiment, here is the series of 11 programs used in my slides demonstrating the workings of fork and exec. You can get them from the unix server under the same names by which they appear in the slides shown in class: fork1.c, fork2.c,..., fork11.c. (Files are in /home/public/molay/ch08/, get them as outlined in the post entitled "Distributing files to you...". Slides are at links, lower left, entitled "Processes" and "Homemade shell". If you download these source files and want to compile so you can run them, the command to compile would be, for example:

  gcc  fork1.c  -o  fork1

The summary of the point of these programs is:

Version Purpose
fork1 shows fork, demonstrates that 2 processes result
fork2 shows PIDs (process id numbers) of these processes, and that they're distinct
fork3 shows fork's return value to the child copy (zero) and its return value to the parent copy (child's PID)
fork4 shows how to code differentiated behavior via an "if" structure conditioned on fork's return value
fork5 incorporates an exec call in the child
fork6 introduces exit call in child and wait call in parent, to give orderly discipline to their relative timing
fork7 gets the name of the program to be exec'd from the user via the command line
fork8 interactively gets the name of the program to be exec'd by prompting user
fork9 puts the activity inside a loop to extend it to second, third, fourth,... commands
fork10 shows a zombie process
fork11 shows an adopted child, init process as its step-parent after being pre-deceased by its original parent

(4/22)

Using a card punch machine. This video shows me that the supply of cards is on the right, they move leftward, and are ejected and stacked up on the left. I described it backwards in class, now I remember! (4/9)

Programming a computer manually (PDP8) from the front panel. (4/9)

Yesterday's leaked proposed encryption bill draft - do you think it's good, bad, or indifferent? (I take the middle ground.) (4/8)

Spring break - coming up. There will be no class meeting April 15. (4/8)

Upcoming topic - will be processes - after we do Chapter 2
read - textbook chapters we will cover on the topic of processes. Those are chapters 3 and 9 (process scheduling).
anticipate - assgt 9, to be done later, after I have demonstrated how to do it in class. (4/8)

Time sharing - a way to allow multiple interactive processes to share a computer's CPU pioneered by Fernando Corbato at MIT. (4/8)

Grades - have been updated, at the link entitled "Grade information" at left. (4/8)

How interrupts save time - my in-class example put some numbers on the textbook's figure 1.5, "Program Flow of Control without and with Interrupts." I assigned time units to the various portions of the program shown in the Figure, both the 5 numbered ones and the I/O Command. Then I calculated the elapsed time from the start of the program till the time it finishes. I did that twice, once where interrupts are not used (Figure's left panel (a) ) and once where they are used (Figure's center panel (b) ). I assigned/posited the following amounts of time:
 1 - takes 6 units
 2 - takes 20 units
 3 - takes 18 units
 4 - takes 4 units
 5 - takes 4 units
 I/O command - takes 8 units

If that were the case, I reached the conclusion that the program as a whole would take 76 time units to complete if all phases ran consecutively (i.e., without interrupts) in the order shown in the Figure, versus only 60 time units if some phases ran concurrently (i.e., with interrupts). A similar question appears on an upcoming test. The question is to perform the identical analysis/calculation, but with different input numbers supplied. Be sure you can do this problem, and you'll be able to do its companion problem on the test. (4/1)

Grades - have been updated. (4/1)

Microfilm for long-term storage durability - is preferred by the National Archives (the people who keep the Declaration of Independence). (3/26)

 

Homework - 
 do the reading in the Reading column of section 4  of the course outline.
 do the assignments found in the "Homework" column of sections 4 and 5. Caching assignment due on paper in class 4/8.

----------------
Some helpful explanation - here is how to correspond or reconcile the vocabulary in the textbook problem, and that at the end of my related writeup. There are 3 terms involved. What he calls T
m, I call Tslow. What he calls Tc, I call Tfast. What he calls "effective access time, I call Tave. There is no difference between what he and I are talking about, it's the same situation. The first term is talking about the native access time of one type of manufactured physical memory, and the second term about that of another. The second one is superior, does its job (moving data in and out) faster, costs more no doubt. Engineers buy that to make their caches. They buy the first, slower kind to make their RAM memory modules (regular memory) that you stick into the slots on your motherboard. The third term, on the other hand, is a little different in that it isn't talking about the native access time of anything. Rather, it's talking about the access time that would be experienced in actually using the computer. That doesn't match the native access time of either of the 2 memory types that the computer contains, since the computer uses a blend of both so that the experienced access time will fall somewhere in between their native times. Better than the slow one, not as good as the fast one. But in doing the problem just recognize that

 Tm = = Tslow

 Tc = = Tfast

 effective access time = = Tave

----------------

Grades - published at link entitled "Grade information," at left. Please check and call any anomalies to my attention. (3/25)

Students I dropped - Orozco, Raymond, Thomas, Wang. (3/25)

Stress test SMP/multicore - I stumbled on y-cruncher (3/24)

Take this survey please - its purpose is to improve the computer science department curriculum. Please cut and paste the URL below into your browser's location/address field:

https://www.surveymonkey.com/r/CSIS-StudentSurvey2016

(3/21)

Operation of a stack - to keep track of where to return after a function call. Shown in the gdb debugger (same one used by ddd debugger you used). (3/18)

System calls - here's a cheat sheet listing the approximately 200 system functions that user programs can call, for various services. Here is some further information. (3/18)

Homework - 
 do the reading in the Reading column of section2 and 3  of the course outline.
 do the assignment found in the "Homework" column of section 3.
----------------
Some helpful explanation about textbook's problem 1.1 at the end of the chapter. It is very similar to the one in the book in Figure 1.4 (and the matching assembly language in-class exercise we did). The difference is, he wants to get/put numbers from/to some devices, instead of memory. So, he gives you 2 new instructions (to go with the 3 you already know) in his hypothetical machine language, for the purpose of shuttling data back and forth to devices.  The instructions require id's of some kind for devices (just as memory locations require addresses, which serve as their id's). The author doesn't provide id's for the devices, but you can do so. You can make up your own id format and system. A good choice for this academic exercise might be 3-digit numbers such as 001 for device 1, 002 for device 2, and so on. Then, putting together the drawing I ask for is a matter of showing the devices and their contained values, and constructing a drawing pretty much the same as the one in Figure 1.4.)
----------------

due date - there are 2 assignments in section 3 homework column. Please perform the first, "some assembly language," on sputnik by the end of the day Sunday 3/20. It leaves the result on sputnik. Please do the second, "make a variation..." on paper and submit it in class Friday 3/25.   (3/18)


Grades - published at link entitled "Grade information," at left. There is a number by which you can look yourself up. It is the same as the one generated from your phone number and used as your password for sputnik.smc.edu, as described here. (3/10)

Job possibility - I was contacted by a gentleman from Raytheon Corporation reporting that he'd hired one of my former students, was pleased with him, and was seeking to fill other jobs. As he's looking for "candidates with solid backgrounds in UNIX" I'm sure not all students in our class will fit but some might. The student who was hired was top-notch and took most or all the SMC classes I teach. The current job opening apparently is outside L.A. The relevant information:

"Again this spring, I am looking for one or more candidates with solid backgrounds in UNIX to join our field service team. These are temporary positions with the possibility of becoming full-time positions, depending on customer needs.

"Details for the positions can be found at : http://jobs.raytheon.com/search/

"with a 'keyword' search for requisition number 77780BR. The position will likely be located out of Beale AFB but work will be at various sites in both Northern and Southern California. Students should submit resumes directly through the web site."

(3/8)

The question whether communicating privately is illegitimate - I came upon something further to last Friday's class discussion on that topic.

I teach part time at USC, which circulates internal publicity about University activities and achievements. I learn that a 28-year old alumnus, Ryan Ozonian, has created an app called Cyber Dust. Ozonian is quoted as explaining, “We wanted to make digital communication the same as a face to face conversation: Ephemeral and not recorded.” and the Cyber Dust website claims, "...unlike other social communication platforms, we guarantee that ours is 100% private just like a normal face-to-face conversation between friends."

In class I drew the comparison between encrypted cyber conversation and whispered acoustic conversation. I identify them as mutually equivalent-- they are the same thing. Ozonian too is saying that, referring to "face-to-face" instead of "whispered."

Whispering is legitimate only if encrypted cybertalk is legitimate. And encrypted cybertalk is illegitimate only if whispering is illegitimate. They are either both legitimate or both illegitimate.

Is whispering illegitimate? (2/29)

No class March 4 - it's an SMC "flex day" for faculty. See you March 11. (2/28)

What does forty-five mean? to your Intel CPU (2/26)

What does "run" mean? (2/26)

Bootable flash drives for you - containing a copy of linux similar to that on our classroom laptops, is available for copying to your USB drive. Optionally, if you are interested, bring an 8GB or bigger flash drive to class and we can copy onto it an image of the USB drive I have prepared. It's persistent. It contains the utilities and configuration I think useful for teaching. I won't formally support it; no promises. But if you are interested come to class with a flash drive and I think you will leave with a linux environment in which to play. I need to know in advance if students want to do this, and how many, so as to prepare some laptops from which to do the copying (it takes a while). If you intend to bring a flash drive next week, tell me tonight. (2/26)

What's the problem? "The real problem is, I don’t see any middle ground for dumbing down everything to make special access possible and having the secure systems we need for commerce, government and everything else.” Peter Neumann

Paramount importance placed by the government on:

1) information non-disclosure - people who disclose information can go to jail

(Signboard warning Los Alamos laboratory workers against disclosure of protected information)  

2) information disclosure - people who don't disclose information can go to jail

(Court order that Apple enable disclosure of protected information)  

Versatility of the computer: not only can it add, it can subtract - but how do we get it to do one of the tricks in its repertoire, versus some other? In the earliest computers, they were rewired to do each task:

"The ENIAC was programmed by wiring cable connections and setting three thousand switches on the function tables. This had to be done for every problem and made using the machine very tedious." 
                http://ei.cs.vt.edu/~history/ENIAC.Richey.HTML

the term for setting the computer to do some certain task is "programming the computer."
see "Programing the ENIAC"

Do modern computers re-wire in order to set and determine what they will do?

Accounts created - per the link below entitled "Remote Unix system account". Please do the homwork item (under the link "First homework" below) that asks you to perform an initial login. (2/19)

Course outline - with approximate weekly topic coverage corresponded to related readings, homework assignments, and in-class slides I will use. Please follow this outline as we move through the topics, for assignments and reading I want you to do (2/19)

The answer is ... (read the lights),  what is the question? Let's understand what these pictures show. The device shows adding 6 and 5 to produce 11. Here are "6 and 5". And here is "11".
Listen to this video from the 7:30 timing mark to the end, describing addition with switches for inputting addends, lights for outputting sums, and a 74xx Texas Instruments chip to hold the "wiring" that does the math.
74xx chip in 1962? No such thing. My classmate then made a science project that did the same thing as in the above video: switches to input addends, lights to output sums. But how did he make the math happen? He built the same functional circuitry as contained in 74xx chips, from basic discrete circuit components ( resistors, capacitors, inductors, diodes, transistors ). The circuits he wired up are as shown here in the several kinds of "logic gates" (scroll down to the circuit diagrams) and further described here.
Here is another discrete component enthsiast/purist's page. (2/19)

Second homework - please
 do the assignment found in the "Homework" column of section 2 of the course outline. anticipate March 4 due date
(2/19)

First homework - please
 read chapter 1 of the textbook. Slowly. Twice.
 read the 7 links about binary and other number systems, below left, under the heading "Number bases" in the "Foundation Concepts" section.

read - write-up at link entitled "Remote Unix access with ssh" at left, and then:
log in - to your remote unix account. Please see section here entitled "Remote Unix system account for you". I will see your login history and record a minor grade credit for your having logged in. Log in by this Friday 2/26. After logging in, get out by running the "exit" command.

listen - to this podcast about operating systems (skip the part from the 6:00 minute mark to the 39:00 minute mark). It spans a lot of topics that we'll encounter in coming weeks, in a broad summary touching on all the items on the OS's job description list (the ones in paragraph titiled "Jobs" below). You won't understand some of it, and I considered not asking you to listen to it on the grounds that it bites off more than you can chew. But that's what the coming weeks are for. Listen to it now. Then, it would be interesting if you did so again after the course to see if I taught you anything.

anticipate, from assignment 1.5, the book's problem 1.1 at the end of Chapter 1, by reviewing the instruction execution example in Figure 1-4 of the textbook and associated discussion. (2/19)

First personal computer - Altair by Ed Roberts

(click photo to enlarge, note switches and lights on front panel)
(2/19)

PCBSD installation - time permitting I hope to demonstrate the installation of an operating system on a laptop in class. I'll use PCBSD. See this related YouTube video and PCBSD's website. (2/19)

Virtual machines - on class laptops (screenshot).

Jobs for which operating systems have responsibility:
 Internal
  memory management
  process management
  device management
  file management
 External
  user interface
 (2/19)

Slides we're viewing
 "Ch1 Computer Overview" - about interrupts, caching, etc
 "OS Installation" - about partitions, MBR, boot process, filesystems etc  (2/19)

Textbook - Operating Systems: Internals and Design Principles, sixth edition, William Stallings, Pearson Prentice Hall. See the information about it on the author's website. (2/19)

Foundation concepts you should be(come) familiar with as background/prerequisite for this class:
 Data structures (lists, stacks)
 Binary and hexadecimal number representation
 Compiling/linking/loading (symbols, address fixups)
 ASCII code
 Processor instruction sets
 System architectures (bus, data lines, interrupt lines)
 Use of ssh
 Use of ftp/sftp

Procedures for using class laptops

A Remote Unix system account is available for your use. 

Using ssh (secure shell). ssh is an important tool you will use for interacting with remote computers. For that you will need an ssh client. There are a number of ssh client alternatives.

Running linux at home.

 

 

Milestones in the history of computation


Tommy Flowers


Colossus - 1944

 

 

Eniac - 1946