UNIT-1
Operating Systems Overview: Operating system functions, Operating system structure, Operating systems operations, Computing environments, Open-Source Operating Systems. System Structures: Operating System Services, User and Operating-System Interface, systems calls, Types of System Calls, system programs, operating system structure, operating system debugging, System Boot.
Download UNIT-1 Material PDF | Reference-2 | Ref-3
UNIT-2
Process Concept: Process scheduling, Operations on processes, Inter-process communication, Communication in client server systems.
Multithreaded Programming: Multithreading models, Thread libraries, Threading issues.
Process Scheduling: Basic concepts, Scheduling criteria, Scheduling algorithms, Multiple processor scheduling, Thread scheduling.
Inter-process Communication: Race conditions, Critical Regions, Mutual exclusion with busy waiting, Sleep and wakeup, Semaphores, Mutexes, Monitors, Message passing, Barriers, Classical IPC Problems – Dining philosophers problem, Readers and writers problem.
Download UNIT-2 Material PDF | Reference-2
UNIT-3
Memory-Management Strategies: Introduction, Swapping, Contiguous memory allocation, Paging, Segmentation.
Virtual Memory Management: Introduction, Demand paging, Copy on-write, Page replacement, Frame allocation, Thrashing, Memory-mapped files, Kernel memory allocation.
Download UNIT-3 Material PDF | Reference-2
UNIT-4
Deadlocks: Resources, Conditions for resource deadlocks, Ostrich algorithm, Deadlock detection and recovery, Deadlock avoidance, Deadlock prevention.
File Systems: Files, Directories, File system implementation, management and optimization. Secondary-Storage Structure: Overview of disk structure, and attachment, Disk scheduling, RAID structure, Stable storage implementation.
Download UNIT-4 Material PDF | Reference-2
UNIT-5
System Protection: Goals of protection, Principles and domain of protection, Access matrix, Access control, Revocation of access rights.
System Security: Introduction, Program threats, System and network threats, Cryptography for security, User authentication, Implementing security defenses, Firewalling to protect systems and networks, Computer security classification. Case Studies: Linux, Microsoft Windows.
Download UNIT-5 Material PDF | Reference-2