Note: Please check your Spam or Junk folder, in case you didn't receive the email with verification code.
SYLLABUS
UNIT-I
Operating Systems Overview: Introduction, Operating System Functions, Operating Systems Operations, Computing Environments, Open-Source Operating Systems. System Structures: Operating System Services, User and Operating-System Interface, Systems Calls, Types of System Calls, System Programs, Operating System Design and Implementation, Operating System Structure, Operating System Debugging, System Boot.
UNIT-II
Process Concept: Process Scheduling, Operations on Processes, Inter-process Communication, Communication in Client Server Systems. Multithreaded Programming: Multithreading Models, Thread Libraries, Threading Issues, Examples. Process Scheduling: Basic Concepts, Scheduling Criteria, Scheduling Algorithms, Multiple Processor Scheduling, Thread Scheduling, Examples. Inter-process Communication: Race Conditions, Critical Regions, Mutual Exclusion with Busy Waiting, Sleep and Wakeup, Semaphores, Mutexes, Monitors, Message Passing, Barriers, Classical IPC Problems – Dining Philosophers Problem, Readers and Writers Problem.
UNIT-III
Memory-Management Strategies: Introduction, Swapping, Contiguous Memory Allocation, Paging, Segmentation, Examples. Virtual Memory Management: Introduction, Demand paging, Copy-on-write, Page Replacement, Frame Allocation, Thrashing, Memory-mapped Files, Kernel Memory Allocation, Examples.
UNIT-IV
Deadlocks: Resources, Conditions for Resource Deadlocks, Ostrich Algorithm, Deadlock Detection and Recovery, Deadlock Avoidance, Deadlock Prevention. File Systems: Files, Directories, File System Implementation, Management and Optimization. Secondary-Storage Structure: Overview of Disk Structure and Attachment, Disk Scheduling, RAID Structure, Stable Storage Implementation.
UNIT-V
System Protection: Goals of Protection, Principles and Domain of Protection, Access Matrix, Access Control, Revocation of Access Rights. System Security: Introduction, Program Threats, System and Network Threats, Cryptography as a Security, User Authentication, Implementing Security Defenses, Firewalling to Protect Systems and Networks, Computer Security Classification. Case Studies: Linux, Microsoft Windows.
No Preview is available for this book
CategoriesComputer Science
Format PDF
TypeeBook