Operating Systems – Syllabus
-
Introduction to Operating Systems:
-
Lesson 1. Definition and functions of an operating system.01 Hrs.
-
Lesson 2. Types of operating systems: batch, time-sharing, distributed, real-time, and multiprogramming systems.02 Hrs.
-
Lesson 3. System calls and operating system structure.02 Hrs.
-
-
Process Management:
-
Lesson 1. Process concept and process scheduling.01 Hrs.
-
Lesson 2. Operations on processes.01 Hrs.
-
Lesson 3. Inter-process communication.01 Hrs.
-
Lesson 4. Threads and multithreading models.02 Hrs.
-
-
CPU Scheduling:
-
Lesson 1. Scheduling criteria and algorithms: FCFS, SJF, Round Robin, Priority scheduling.04 Hrs.
-
Lesson 2. Multilevel queue scheduling.02 Hrs.
-
Lesson 3. Multilevel feedback queue scheduling.02 Hrs.
-
-
Process Synchronization:
-
Lesson 1. Critical section problem.01 Hrs.
-
Lesson 2. Peterson’s solution.01 Hrs.
-
Lesson 3. Synchronization hardware.01 Hrs.
-
-
Lesson 4. Semaphores and classical problems of synchronization.01 Hrs.
Deadlocks
-
Lesson 1. System model and deadlock characterization.01 Hrs.
-
Lesson 2. Methods for handling deadlocks: prevention, avoidance, detection, and recovery.01 Hrs.
-
Lesson 3. Deadlock detection algorithms.01Hrs.
-
Lesson 3. Recovery from deadlock.01 Hrs.
Memory Management:
-
Lesson 1. Logical versus physical address space.01 Hrs.
-
Lesson 2. Swapping and contiguous memory allocation.01 Hrs.
-
Lesson 3. Paging and segmentation.01 Hrs.
-
Lesson 4. Virtual memory and demand paging.01 Hrs.
-
Lesson 5. Page replacement algorithms.01 Hrs.
File System Interface:
-
Lesson 1. File concept and access methods .01 Hrs.
-
Lesson 2. Directory structure and file system mounting.01 Hrs.
-
Lesson 3. File sharing and protection.01 Hrs.
I/O Systems
-
Lesson 1. I/O hardware and application I/O interface.02 Hrs.
-
Lesson 2. Kernel I/O subsystem.02 Hrs.
-
Lesson 3. Transforming I/O requests to hardware operations.02 Hrs.
-
Lesson 4. Performance considerations.02 Hrs.
Protection and Security:
-
Lesson 1. Goals of protection and domain of protection.01 Hrs.
-
Lesson 2. Access matrix and implementation of access matrix.01 Hrs.
-
Lesson 3. Security problems and threats.01 Hrs.
-
Lesson 4. Authentication and encryption.01 Hrs.

