Operating System (CS 502)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Paper Name: Operating System

Code: CS 502
Contacts: 3L + 1T
Credits: 4
Allotted hours: 42L

Module 1: Basics 3L
Operating System Functionalities, evolution of O.S., Different types of O.S.: batch, multi-programmed, time-
sharing, real-time, distributed, parallel, Structural overview, Loader, linker, assembler, command interpreter,
compiler

Module 2: Process Management 18L


Processes: Concept of processes, process states, PCB, process scheduling, co-operating processes, independent
process, suspended process, Interaction between processes and OS, Inter-process communication: Message
passing, pipes.
3L
Threads: overview, benefits of threads, user and kernel level threads, threading models. 2L

CPU scheduling: scheduling criteria, preemptive & non-preemptive scheduling, scheduling algorithms (FCFS,
SJF, SRTF, RR, priority, multilevel queue, multilevel feedback queue scheduling).
4L

Process Synchronization : background, critical section problem, synchronization hardware, classical problems
of synchronization(producer-consumer, readers-writer, dining philosophers, etc), semaphores, monitors.
5L

Deadlocks: deadlock characterization, methods for handling deadlocks, deadlock prevention, deadlock avoidance,
deadlock detection, recovery from deadlock. 4L

Module 3: Memory Management 7L


Background, logical vs. physical address space, swapping, contiguous memory allocation, paging,
Segmentation, TLB. 4L

Virtual Memory: background, demand paging, page replacement algorithms (FCFS, LRU, Optimal), thrashing,
Working set model. 3L

Module 4: I/O Management 4L


I/O hardware, polling, interrupts, DMA, caching, buffering, blocking-non blocking I/O.

Module 5: Disk Management 4L


Disk structure, disk scheduling (FCFS, SSTF, SCAN,C-SCAN,LOOK,C-LOOK etc),disk reliability, disk
formatting, boot block, bad blocks.

Module 6: File Systems 3L


File concept, access methods, directory structure, file system structure, UNIX file structure, allocation
methods (contiguous, linked, indexed), free-space management (bit vector).

Module 7: Protection & Security 3L


Goals of protection, domain of protection, access rights, access matrix, security problem, authentication, one time
password, threats( Virus, Worm, Trojan horse etc), encryption.
Recommended reference Books:
[1]Abraham Silberschatz, Peter B. Galvin, Greg Gagne, Operating System Concepts. Sixth edition.
Addison-Wesley (2003)
[2]Andrew Tanenbaum, Modern Operating Systems, Prentice Hall.
[3]William Stallings, Operating Systems, Prentice Hall.
[4] Dhamdhere, Operating System, TMH

You might also like