OS
Unit-1 : Introduction Computer -System Organization, Computer -System
Architecture, Operating -System Structure, Operating -System Operations,
Process Management, Memory Management, Storage Management,
Protection and Security, Kernel Data Structures, Computing Environments,
Open -Source Operating Systems, Operating -System Services, User and
Operating -System Interface, System Calls, Types of System Calls, System
Programs, Operating -System Design and Implementation, Operating -System
Structure, Operating -System Debugging, Operating -System Generation,
System Boot
Unit-2 : PROCESS MANAGEMENT: Process Concept, Process Scheduling,
Operations on Processes, Interprocess Communication, Communication in
Client– Server Systems, Threads: Multicore Programming, Multithreading
Models, Thread Libraries, Implicit Threading, Threading Issues. Process
Synchronization: The Critical -Section Problem, Peterson’s Solution,
Synchronization Hardware, Mutex Locks, Semaphores, Classic Problems of
Synchronization, Monitors.
Unit -3: CPU Scheduling: Basic Concepts, Scheduling Criteria, Scheduling
Algorithms, Thread Scheduling, Multiple -Processor Scheduling, Real -Time CPU
Scheduling. Deadlocks: System Model, Deadlock Characterization, Methods for
Handling Deadlocks, Deadlock Prevention, Deadlock Avoidance, Deadlock
Detection, Recovery from Deadlock.
Unit -4 : MEMORY MANAGEMENT: Main Memory, Swapping, Contiguous
Memory Allocation, Segmentation, Paging, Structure of the Page Table. Virtual
Memory: Introduction, Demand Paging, Copy -on -Write, Page Replacement,
Allocation of Frames, Thrashing, Memory -Mapped Files, Allocating Kernel
Memory. STORAGE MANAGEMENT: Disk Structure, Disk Attachment, Disk
Scheduling, Disk Management, Swap -Space Management, RAID Structure. File
-System Interface: File Concept, Access Methods, Directory and Disk Structure, File-
System Mounting, File Sharing, Protection.
Unit-5: PROTECTION AND SECURITY: Goals of Protection, Principles of Protection, Domain of
Protection, Access Matrix, Implementation of the Access Matrix, Access Control, Revocation of
Access Rights, Capability-Based Systems, Language-Based Protection, The Security Problem, Program
Threats, System and Network Threats, Cryptography as a Security Tool, User Authentication,
Implementing Security Defenses, Firewalling to Protect Systems and Networks, Computer-Security
Classifications.