Documente Academic
Documente Profesional
Documente Cultură
Engineering ,Sangli
Computer Science and Engineering Department
Aparna Pawar(2017BTECS00041)
Pratibha Garje(2017BTECS00108)
Agenda
Cache Manager
Plug-and-Play Manager
Registery
Booting
Cache manager
In many operating system ,caching is done by the file system.
Windows XP provides a centralized caching facility.
Cache manager works closely with the VM manager to provide cache services
for all components under the control of the I/O manager.
Caching in Windows XP is based on files rather than raw blocks.
Size of cache changes dynamically according to how much free memory is
available in the system.
The upper 2GB of a process's address space comprise the system area; it is
available in the context of all processes. The VM manager allocates up to one-
half of this space to the system cache.
• The cache manager maps files into this address space and uses the
capabilities of the VM manager to handle file I/0.
• The cache is divided into blocks of 256 KB. Each cache block can hold a
view (that is, a memory-mapped region) of a file.
• This array has an entry for each 256-KB chunk of the file.An entry in the
VACB index array points to the VACB if that portion of the file is in the
cache; it is null otherwise.
• When the I/0 manager receives a file's user-level read request, the I/0
manager sends an IRP to the device-driver stack on which the file
resides.
• The file system attempts to look up the requested data in the cache
manager
• The cache manager calculates which entry of that file's VACB index array
corresponds to the byte offset of the request. The entry either points to the
view in the cache or is invalid. If it is invalid, the cache manager allocates a
cache block and maps the view into the cache block.
• The cache manager then attempts to copy data from the mapped file to
the caller's buffer. If the copy succeeds, the operation is completed.
Security Reference Monitor
The object-oriented nature of XP enables the use of a
uniform mechanism to perform runtime access
validation and audit checks for every entity in the system
• Restricted tokens are primarily used to restrict the damage that can
be done by execution of untrusted code
• A C-2 security rating requires that the system have the ability to
detect and log all attempts to access system resources so that it is
easier to trace attempts at unauthorized access
Plug-and-Play Manager