Operating Systems
Unit 1
Introduction to Operating System
- Architecture of OS (Ex. Monolithic, Microkernel, Layered , Exo kernel)
- Operating system objectives and functions
- Virtual Computers
- Interaction of O. S. & hardware architecture
- Evolution of operating systems, Batch, multiprogramming
- Multitasking, Multiuser, parallel, distributed & real ātime O.S.
- System calls, O. S. Shell, Linux Shell commands, Shell programming.
- Examples of O. S.: Linux, MS-Windows, Handheld OS
Process Management
- Process, Process description, Process states, Process control, Threads, Processes and Threads
- Uniprocessor Scheduling: Types of scheduling
- Scheduling algorithms: FCFS, SJF, Priority, Round Robin
- UNIX Multi-level feedback queue scheduling, Thread Scheduling
- Multiprocessor Scheduling concept, Real Time Scheduling concept
Unit 2
Concurrency
- Principles of Concurrency
- Critical Section problem
- Mutual Exclusion H/W Support, software approaches
- Semaphores and Mutex
- Message Passing
- Monitors
- Classical Problems of Synchronization: Readers-Writers Problem, Producer Consumer Problem, Dining Philosopher problem
Deadlock
- System model
- Deadlock characterization
- Methods for handling deadlocks
- Deadlock prevention
- Deadlock avoidance
- Deadlock detection
- Recovery from deadlock
Unit 3
Memory Management
- Memory Management requirements
- Memory partitioning: Fixed ,dynamic, partitioning, Contiguous memory allocation
- Buddy System Memory allocation Strategies (First Fit, Best Fit, Worst Fit, Next Fit)
- Fragmentation
- Swapping
- Segmentation
- Paging
- Virtual Memory
- Demand paging
- Page Replacement Policies (FIFO, LRU, Optimal, clock)
- Thrashing
I/O Management and Disk Scheduling
- I/O Devices
- Organization of I/O functions
- Operating System Design issues
- I/O Buffering
- Disk Scheduling (FCFS, SCAN, C-SCAN, SSTF)
- Disk Caches
Unit 4
File Management
- Overview
- File Organization and access
- File Directories
- File Sharing
- Security issues
- Record Blocking
- Secondary Storage Management
Computer security & protection
- Security Threats
- Attacks and assets
- Intruders
- Malicious software
- Protection: Protection Policy and mechanisms
- Authentications: Internal Access Authorizations
- Implementations
Last updated on