SYLLABUS
UNIT-I
Operating Systems Overview: Operating System Functions, Operating System Structure, Operating
Systems Operations, Protection and Security, Computing Environments, Open-Source Operating
Systems.
System Structures: Operating System Services, User and Operating System Interface, Systems Calls,
Types of System Calls, System Programs, Operating System Structure, Operating System Debugging,
System Boot.
Processes: Process Concept, Process Scheduling, Operations on Processes, Inter Process
Communication, Examples of IPC Systems.
UNIT-II
Threads: Overview, Multicore Programming, Multithreading Models, Thread Libraries, Implicit Threading,
Threading Issues.
Process Synchronization: The Critical-section Problem, Peterson’s Solution, Synchronization Hardware,
Mutex Locks, Semaphores, Classic Problems of Synchronization, Monitors, Synchronization Examples,
Alternative Approaches.
CPU Scheduling: Scheduling Criteria, Scheduling Algorithms, Thread Scheduling, Multiple Processor
Scheduling, Real-time CPU Scheduling, Algorithm Evaluation.
UNIT-III
Memory Management: Swapping, Contiguous Memory Allocation, Segmentation, Paging, Structure
of the page table.
Virtual Memory: Demand Paging, Page-replacement, Allocations of Frames, Thrashing, Memory-mapped
Files, Allocating Kernel Memory.
Deadlocks: System Model, Deadlock Characterization, Methods of Handling Deadlocks, Deadlock
Prevention, Detection and Avoidance, Recovery from Deadlock.
UNIT-IV
Mass-Storage Structure: Overview of Mass-storage Structure, Disk Structure, Disk attachment, Disk
Scheduling, Swap-space Management, RAID Structure, Stable-storage Implementation.
File System Interface: The Concept of a File, Access Methods, Directory and Disk Structure, File System
Mounting, File Sharing, Protection.
File System Implementation: File System Structure, File System Implementation, Directory
Implementation, Allocation Methods, Free Space Management.
UNIT-V
I/O Systems: I/O Hardware, Application I/O Interface, Kernel I/O Subsystem, Transforming I/O requests
to Hardware Operations.
Protection: Goals of Protection, Principles of Protection, Domain of Protection, Access Matrix,
Implementation of Access Matrix, Access Control, Revocation of Access Rights, Capability-based
Systems, Language-based Protection.
Security: The Security problem, Program Threats, System and Network threats, Cryptography as a
Security tool, User Authentication, Implementing Security Defenses, Firewalling to protect Systems and
networks, Computer Security Classifications.