Sunteți pe pagina 1din 13

Walchand College of

Engineering ,Sangli
Computer Science and Engineering Department

Aparna Pawar(2017BTECS00041)

Pratibha Garje(2017BTECS00108)
Agenda

 Cache Manager

 Security Reference Monitor

 Plug-and-Play Manager

 Registery

 Booting
Cache manager
 In many operating system ,caching is done by the file system.
 Windows XP provides a centralized caching facility.

 Cache manager works closely with the VM manager to provide cache services
for all components under the control of the I/O manager.
 Caching in Windows XP is based on files rather than raw blocks.
 Size of cache changes dynamically according to how much free memory is
available in the system.
 The upper 2GB of a process's address space comprise the system area; it is
available in the context of all processes. The VM manager allocates up to one-
half of this space to the system cache.
• The cache manager maps files into this address space and uses the
capabilities of the VM manager to handle file I/0.

• The cache is divided into blocks of 256 KB. Each cache block can hold a
view (that is, a memory-mapped region) of a file.

• Each cache block is described by a virtual address control block (VACB)


that stores the virtual address and file offset for the view, as well as the
number of processes using the view.

• The VACBs reside in a single array maintained by the cache manager.


• For each open file, the cache manager maintains a separate VACB
index array that describes the caching for the entire file.

• This array has an entry for each 256-KB chunk of the file.An entry in the
VACB index array points to the VACB if that portion of the file is in the
cache; it is null otherwise.

• When the I/0 manager receives a file's user-level read request, the I/0
manager sends an IRP to the device-driver stack on which the file
resides.
• The file system attempts to look up the requested data in the cache
manager

• The cache manager calculates which entry of that file's VACB index array
corresponds to the byte offset of the request. The entry either points to the
view in the cache or is invalid. If it is invalid, the cache manager allocates a
cache block and maps the view into the cache block.

• The cache manager then attempts to copy data from the mapped file to
the caller's buffer. If the copy succeeds, the operation is completed.
Security Reference Monitor
 The object-oriented nature of XP enables the use of a
uniform mechanism to perform runtime access
validation and audit checks for every entity in the system

 Whenever a process opens a handle to an object, the


security reference monitor checks the process’s security
token and the object’s access control list to see whether
the process has the necessary rights

 The SRM is also responsible for manipulating the


privileges in security tokens.
Special privileges are required for users to perform backup or restore
operations on file systems, debug processes, and so forth.

• Tokens can also be marked as being restricted in their privileges so


that they cannot access objects that are available to most users.

• Restricted tokens are primarily used to restrict the damage that can
be done by execution of untrusted code

• Another responsibility of the SRM is logging security audit events

• A C-2 security rating requires that the system have the ability to
detect and log all attempts to access system resources so that it is
easier to trace attempts at unauthorized access
Plug-and-Play Manager

 Plug-and-Play (PnP) manager is used to recognize and


adapt to changes in the hardware configuration

 When new devices are added (for example, PCI or USB),


the PnP manager loads the appropriate driver

 The manager also keeps track of the resources used by


each device
Registry
Windows XP keeps much of its configuration information in an internal database called
the Registry.
 A registry database is called as hive.
 The information in the system hive is booted by the registry manager.
 Every time the system successfully boots, it saves the system hive as last known
good.
 If the user installs software, such as a device driver, that produces a system-hive
configuration that will not boot, the user can usually boot using the last-known-
good configuration.
 Windows XP has a component called System restore that periodically saves the
hives.
 restored to a previously working state in cases where the system boots but no longer
operates as expected.
Booting

 Starting a computer or a computer -embedded device a called booting


 Booting Steps:
1)Switching on power supply.
2)Loading operating system computer's main memory.
3)keep all application in a state of rediness in case needed by the
user.
 The first program or set of instructions that run when the computer is
switched on is called BIOS or Basic Input Output System.
 BIOS is firmware(permanent software programmed into a read-only
memory.)
• Restarting a system when it is already running is rebooting
• Rebooting is required if
1)A software or hardware has been installed
2)System is unusually slow
• Two types of booting
1)Cold Booting:System is started by switching on the power supply.The
next step is loading BIOS.
2)Warm Booting:When the system is already running and needs to be r
estarted or rebooted,it is called warm booting
Thank You!

S-ar putea să vă placă și