Skip to Content
Semester 4SyllabusOperating Systems

Operating Systems

Unit 1

Introduction to Operating System

  • Architecture of OS (Ex. Monolithic, Microkernel, Layered , Exo kernel)
  • Operating system objectives and functions
  • Virtual Computers
  • Interaction of O. S. & hardware architecture
  • Evolution of operating systems, Batch, multiprogramming
  • Multitasking, Multiuser, parallel, distributed & real –time O.S.
  • System calls, O. S. Shell, Linux Shell commands, Shell programming.
  • Examples of O. S.: Linux, MS-Windows, Handheld OS

Process Management

  • Process, Process description, Process states, Process control, Threads, Processes and Threads
  • Uniprocessor Scheduling: Types of scheduling
  • Scheduling algorithms: FCFS, SJF, Priority, Round Robin
  • UNIX Multi-level feedback queue scheduling, Thread Scheduling
  • Multiprocessor Scheduling concept, Real Time Scheduling concept

Unit 2

Concurrency

  • Principles of Concurrency
  • Critical Section problem
  • Mutual Exclusion H/W Support, software approaches
  • Semaphores and Mutex
  • Message Passing
  • Monitors
  • Classical Problems of Synchronization: Readers-Writers Problem, Producer Consumer Problem, Dining Philosopher problem

Deadlock

  • System model
  • Deadlock characterization
  • Methods for handling deadlocks
  • Deadlock prevention
  • Deadlock avoidance
  • Deadlock detection
  • Recovery from deadlock

Unit 3

Memory Management

  • Memory Management requirements
  • Memory partitioning: Fixed ,dynamic, partitioning, Contiguous memory allocation
  • Buddy System Memory allocation Strategies (First Fit, Best Fit, Worst Fit, Next Fit)
  • Fragmentation
  • Swapping
  • Segmentation
  • Paging
  • Virtual Memory
  • Demand paging
  • Page Replacement Policies (FIFO, LRU, Optimal, clock)
  • Thrashing

I/O Management and Disk Scheduling

  • I/O Devices
  • Organization of I/O functions
  • Operating System Design issues
  • I/O Buffering
  • Disk Scheduling (FCFS, SCAN, C-SCAN, SSTF)
  • Disk Caches

Unit 4

File Management

  • Overview
  • File Organization and access
  • File Directories
  • File Sharing
  • Security issues
  • Record Blocking
  • Secondary Storage Management

Computer security & protection

  • Security Threats
  • Attacks and assets
  • Intruders
  • Malicious software
  • Protection: Protection Policy and mechanisms
  • Authentications: Internal Access Authorizations
  • Implementations
Last updated on