X hits on this document

213 views

0 shares

0 downloads

0 comments

42 / 93

Page 42 of 93

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY

HYDERABAD

II Year B.Tech. IT II-SemT P C

4+1*04

OPERATING SYSTEMS

UNIT I :

Computer System and Operating System Overview: Overview of computer operating systems operating systems functions protection and security distributed systems special purpose systems operating systems structures and systems calls operating systems generation   

UNIT II :

Process Management – Process concepts threads, scheduling-criteria algorithms, their evaluation,     

Thread scheduling, case studies UNIX, Linux, Windows

UNIT III :

Concurrency : Process synchronization, the critical- section problem, Peterson’s Solution, synchronization Hardware, semaphores, classic problems of synchronization, monitors, Synchronization examples, atomic transactions. Case studies UNIX, Linux, Windows

UNIT IV :

Memory Management : Swapping, contiguous memory allocation, paging, structure of the page table , segmentation, virtual memory, demand paging, page-Replacement, algorithms, case studies   UNIX, Linux, Windows

UNIT V :

Principles of deadlock – system model, deadlock characterization, deadlock prevention, detection and avoidance, recovery form deadlock,

I/O systems, Hardware, application interface, kernel I/O subsystem, Transforming I/O requests Hardware operation, STREAMS, performance.

UNIT VI :

File system Interface- the concept of a file, Access Methods, Directory structure, File system mounting, file sharing, protection.

File System implementation- File system structure, file system implementation, directory implementation, directory implementation, allocation methods, free-space management, efficiency and performance, case studies. UNIX, Linux, Windows

UNIT VII :

Mass-storage structure overview of Mass-storage structure, Disk structure, disk attachment disk scheduling, swap-space management, RAID structure, stable-storage implementation, Tertiary storage structure.

UNIT VIII :

Protection : Protection, Goals of Protection, Principles of Protection, Domain of protection Access Matrix, Implementation of Access Matrix, Access control, Revocation of Access Rights, Capability- Based systems, Language – Based Protection,  

Security- The Security problem, program threats, system and network threats cryptography as a security tool, user authentication, implementing security defenses, firewalling to protect systems and networks, computer –security classifications, case studies UNIX, Linux, Windows

TEXT BOOKS :

1. Operating System Concepts- Abraham Silberchatz, Peter B. Galvin, Greg Gagne 7th Edition, John Wiley.

2. Operating systems- A Concept based Approach-D.M.Dhamdhere, 2nd Edition, TMH

REFERENCES :

1. Operating Systems’ – Internal and Design Principles Stallings, Fifth

   Edition–2005, Pearson education/PHI

2. Operating System A Design Approach-Crowley, TMH.

3. Modern Operating Systems, Andrew S Tanenbaum 2nd edition     Pearson/PHI.

Document info
Document views213
Page views213
Page last viewedTue Dec 06 21:57:25 UTC 2016
Pages93
Paragraphs3102
Words29541

Comments