Академический Документы
Профессиональный Документы
Культура Документы
Course Code CSE316 Course Category Course Title OPERATING SYSTEMS Courses with conceptual focus Course Planner 14623::Pushpendra Kumar Petriya Lectures 4.0 Tutorials Practicals Credits 0.0 0.0 4.0
TextBooks Sr No T-1 Title Operating System Concepts Reference Books Sr No R-1 R-2 R-3 Other Reading Sr No OR-1 OR-2 OR-3 OR-4 OR-5 OR-6 OR-7 OR-8 OR-9 Journals articles as Compulsary reading (specific articles, complete reference) http://codex.cs.yale.edu/avi/os-book/OS8/os8c/practice-exer-dir/22-web.pdf , http://codex.cs.yale.edu/avi/os-book/OS8/os8c/practice-exer-dir/21-web.pdf , http://codex.cs.yale.edu/avi/os-book/os7/slidedir/ index.html , www.softlookup.com/tutorial/os.asp , http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-828-operating-system-engineering-fall-2006/lecture-notes/ , http://www.academicearth.org/courses/operating-systems-and-system-programming , http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-BANG/Operating%20Systems/New_index1.html , http://academic.research.microsoft.com/Journal/190/sigops-operating-systems-review , http://static.usenix.org/events/osdi10/tech/full_papers/Boyd-Wickizer.pdf , Title Operating Systems Internals and Design Principles Operating Systems Modern Operating System Author WilliamStallings D.M.Dhardhere Andrew S. Tanenbaum Edition 5th 2nd 2nd Year 2000 2006 1992 Publisher Name Prentice Hall Tata McGraw Hill Prentice Hall Author Silberschatz and Galvin, Edition 7th Year 2000 Publisher Name Wiley
Relevant Websites Sr No RW-1 RW-2 RW-3 RW-4 (Web address) (only if relevant to the course) http://academic.research.microsoft.com/Keyword/44295/virtual-memory http://static.usenix.org/events/hotos11/tech/final_files/Bhattacharya.pdf http://static.usenix.org/events/hotos11/tech/final_files/Kooburat.pdf http://static.usenix.org/events/hotos11/tech/final_files/Kuz.pdf Salient Features Discussed Virtual Memory Virtually Cool Ternary Content Addressable Memory The Best of Both Worlds with On-Demand Virtualization Multicore OS benchmarks
Software/Equipments/Databases Sr No SW-1 SW-2 SW-3 SW-4 SW-5 SW-6 SW-7 SW-8 (S/E/D) (only if relevant to the course) http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-828operating-system-engineering-fall-2006/lecture-notes/l1.pdf http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-BANG/Operating %20Systems/pdf/Lecture_Notes/Mod%201_LN.pdf http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-828operating-system-engineering-fall-2006/lecture-notes/l3.pdf http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-BANG/Operating %20Systems/pdf/Lecture_Notes/Mod%202_LN.pdf http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-BANG/Operating %20Systems/pdf/Lecture_Notes/Mod%203_LN.pdf http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-BANG/Operating %20Systems/pdf/Lecture_Notes/Mod%204_LN.pdf http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-BANG/Operating %20Systems/pdf/Lecture_Notes/Mod%205_LN.pdf http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-BANG/Operating %20Systems/pdf/Lecture_Notes/Mod%208_LN.pdf Salient Features OS overview Introduction to Operating System OS Organization File Systems and Management Processes and Process management Memory Management Input Output (IO) Management Real-time Operating Systems and Microkernels
LTP week distribution: (LTP Weeks) Weeks before MTE Weeks After MTE Spill Over 7 6 2
Week 1
Lecture 1
Introduction to Operating System (Operating System Meaning) Introduction to Operating System (Supervisor & User Mode)
T-1:1.1
T-1:1.5.1
Student will understand Slide show the modes of Operating Syste Students will learn, How operating system operates Slide show
Lecture 2
Introduction to Operating System (Operating System Operations and Functions) Introduction to Operating System (Types of Operating System : Simple Batch Systems)
Lecture 3
T-1:1.3
About Different Types of Student will learn the Operating Systems basic characteristics of different types of OS
Slide show
Week 1
Lecture 4
Introduction to Operating System (Multiprogramming and Multiprocessing System) Introduction to Operating System (Multitasking,Parallel ,Distributed and RTOS etc)
T-1:1.4
About Multiprogramming and Multiprocessing About Multitasking, Parallel or Distributed processing and RTOS
Students will be able to Slide show understand the differences between these two Students will get to know basic characteristics of Multitasking,Parallel, Distributed and RTOS etc Slide show
Week 2
Lecture 5
T-1:1.10 1.11
Lecture 6
Operating System Structure (Operating System Services) Operating System Structure (System Calls) Operating System Structure (System Programs) Process Management(Process Concept , Life Cycle) Process Management(PCB, Operations on Processes) Process Management(Co-operating and Independent Processes) Operating System Structure(Kernel structures : Monolithic) Operating System Structure (Layered Structure)
T-1:2.1
About Operating System students will learn Slide show Services AboutOperating System Services About System Calls about System Programs Learn about System Calls Learn about System Programs Slide show Slide show Slide show
About Process Concept , Learn About Process Life Cycle Concept , Life Cycle About PCB, Operations on Processes Term Paper Allotment
students will learn Slide show about PCB, Operations on Processes Learn about Cooperating and Independent Processes Slide show
Lecture 12
T-1:3.4
Lecture 9
T-1:2.7
About Monolithic Kernel Students will learn structures about Monolithic Kernel structures About Layered Structure Learn about Layered Structure about InterProcess Communication About Thread Concept Kernel Level and User Level Threads About Multithreding,Thread Libraries and Thread Issues Homewok1 Allotment About Semaphores ,Mutex and Monitors About Dining Philosopher Problem,Readerwriter Problem Learn InterProcess Communication Learn Thread Concept Kernel Level and User Level Threads Learn about Multithreding,Thread Libraries and Thread Issues Learn about Critical Section Problem
Slide show
Week 4
Lecture 13 Lecture 14
Process Management(Inter-Process Communication) Process Management(Thread Concept : Kernel Level and User Level Threads) Process Management (Multithreding,Thread Libraries and Thread Issues) Process Synchronization(Critical Section Problem) Process Synchronization (Semaphores ,Mutex and Monitors) Process Synchronization(Dining Philosopher Problem,Reader-writer Problem etc)
Lecture 15
Slide show
Slide show
Learn about Slide show Semaphores ,Mutex and Monitors Learn about Dining Philosopher Problem,Readerwriter Problem Slide show
Lecture 18
T-1:6.6
Week 5
Lecture 19
Process Synchronization(Dining Philosopher Problem,Reader-writer Problem etc) CPU Scheduling(Types of Scheduling) CPU Scheduling(Scheduling Algorithms) CPU Scheduling(Scheduling Algorithms) CPU Scheduling(Multi-Processor Scheduling Algorithm)
T-1:6.6
About Dining Philosopher Problem,Readerwriter Problem About Types of Scheduling About Scheduling Algorithms About Scheduling Algorithms About MultiProcessor Scheduling Algorithm About Deadlock Characterization
Learn about Dining Philosopher Problem,Readerwriter Problem Learn about Types of Scheduling
Slide show
Slide show
Learn about Scheduling Slide show Algorithms Learn about Scheduling Slide show Algorithms Learn about MultiProcessor Scheduling Algorithm Learn about Deadlock Characterization Slide show
Lecture 23 Lecture 24
Deadlock(Deadlock Characterization) Deadlock(Handling of deadlocksDeadlock Prevention) Deadlock(Handling of deadlocksDeadlock Prevention) Deadlock(Deadlock Avoidance & Detection) Deadlock(Deadlock Avoidance & Detection) Deadlock(Deadlock Recovery)
Slide show
HomeWork1 Submission Learn about Handling Slide show of deadlocks Deadlock Prevention HomeWork1 Submission Learn about Handling Slide show of deadlocks Deadlock Prevention About Deadlock Avoidance Detection About Deadlock Avoidance Detection About Deadlock Recovery Learn about Deadlock Avoidance Detection Learn about Deadlock Avoidance Detection Learn about Deadlock Recovery Slide show Slide show Slide show
Week 7
Lecture 25
T-1:7.3 7.4
MID-TERM
Week 8 Lecture 29 Lecture 30 Lecture 31 Memory Management(Logical & Physical Address Space) Memory Management(Swapping) Memory Management(Contiguous Memory allocation) Memory Management(Paging) Memory Management (Segmentation) Memory Management(Virtual Memory and Demand Paging) Memory Management(Virtual Memory and Demand Paging) T-1:8.1 T-1:8.2 T-1:8.3 About Logical Physical Learn about Logical Slide show Address Space Physical Address Space About About Contiguous Memory allocation About Paging About segmentation About Virtual Memory and Demand Paging About Virtual Memory and Demand Paging Students will learn about Swapping Students will learn about Contiguous Memory allocation Learn about Paging Learn about segmentation Students will learn about Virtual Memory and Demand Paging Students will learn about Virtual Memory and Demand Paging Slide show Slide show
Lecture 35
Slide show
Week 9
Lecture 36
About File Concepts About Access methods About Directory Structure About File System Mounting and Sharing About Protection About Allocation methods About FreeSpace Management About Directory Implementation About Directory Implementation About Application IO Interface About Kernel IO subsystem Homework,Term Paper,Test 3
Learn about File Concepts Learn about Access methods Learn about Directory Structure Students will learn about File System Mounting and Sharing
Week 10
Lecture 37 Lecture 38
File Management(Directory Structure) File Management(File System Mounting and Sharing) File Management(Protection) File Management(Allocation methods) File Management(Free-Space Management) File Management(Directory Implementation) I/O and Secondary Storage Structure(Directory Implementation)
Lecture 39 Lecture 40
T-1:10.6 T-1:10.4
Learn about Protection Slide show students will learn about Allocation methods Slide show
Week 11
Lecture 41 Lecture 42
Learn about FreeSpace Slide show Management Learn about Directory Implementation Learn about Directory Implementation Learn about Application IO Interface Students will learn About Kernel IO subsystem Slide show Slide show
Lecture 43
I/O and Secondary Storage Structure(Application I/O Interface) I/O and Secondary Storage Structure(Kernel I/O subsystem)
T-1:Chapter 13.3
Slide show
T-1:Chapter 13.4
Slide show
Lecture 44 Week 12 Lecture 45 I/O and Secondary Storage Structure(Disk Scheduling) I/O and Secondary Storage Structure(Disk Management) Lecture 46 I/O and Secondary Storage Structure(Swap-Space Management) I/O and Secondary Storage Structure(RAID Structure) Lecture 47 Protection and Security(Need for Security) Protection and Security(Secure Software Systems) Lecture 48 Protection and Security(Different Security Environments) T-1:Chapter 12.4 T-1:Chapter 12.5 T-1:Chapter 12.6
About Disk Management Learn about Disk Management about SwapSpace Management About RAID Structure System security introduction Term Paper Final Submission Learn SwapSpace Management Learn about RAID Structure Learn about system security Learn about Secure Software Systems
about Different Security Learn about Different Slide show Environments Security Environments
Week 12
Lecture 48
Protection and Security(Security Vulnerability like Buffer overflow) Protection and Security(Trapdoors, Backdoors, cache poisoning etc) Protection and Security(Access Control based Security SystemsAccess Control Models)
T-1:18.1
about Security Learn about Security Vulnerability like Buffer Vulnerability like overflow Buffer overflow About ssecurity threats About Access Control based Security Systems Access Control Models Learn about security threats
Slide show
Week 13
Lecture 49
Slide show
Learn about Access Slide show Control based Security Systems Access Control Models Slide show
Lecture 50
Protection and Security (Implementing the Access Control Matrix) Protection and Security (Authentication-Password based Authentication) Protection and Security(Password Maintenance & Secure Communication)
T-1:Chapter 17.5
About Implementing the Learn about Access Control Matrix Implementing the Access Control Matrix About Password based Authentication About Password Maintenance Secure Communication Learn about Password based Authentication
T-1:Chapter 18.5
Slide show
T-1:Chapter 18.5
Lecture 51
Protection and Security (Application Security - Virus, Program Threats) Case studies(Case Studies of Linux) Case studies(Case Studies of Windows.)
About Application Learn about Slide show Security Virus, Program Application Security Threats Virus, Program Threats About Case Studies of Linux About Case Studies of Windows Learn about Case Studies of Linux Learn about Case Studies of Windows Slide show Slide show
Lecture 52
SPILL OVER
Week 14 Lecture 53 T-1:23.6 23.8 Influential operating systems IBM OS360,CTSS Multimedia systems network management, CPU scheduling Students will learn Slide show about Influential operating systems IBM OS360,CTSS Students will learn about Multimedia systems network management, CPU scheduling slide show
Lecture 54
T-1:20.1 20.6
AT No.
Objective
Evaluation Mode
Homework 1
To reinforce and Introduction to Operating System, Operating System Structure, extend learning Process Management initiated in class and develop abilities for studying independently. To enrich learning and encourage individual initiatives.
Term Paper 1
1 Compare the MemoryManagement of Windows with Linux Group 2 Case Study: According to you which one among UNIX, LINUX and Windows, is best. 3 What should be done for proper working of your computer system? Give general guidelines 4 How windows operating system handles viruses? Write down various viruses that can cause serious damage to the computer system. 5 Compare CPU Scheduling of LINUX and UNIX. 6 Compare the MemoryManagement of UNIX with Linux 7 Compare Features of Windows 2000 with windows Vista 8 Compare Features of Windows 2000 with windows XP 9 Compare Features of Windows 2000 with windows 98 10 Which operating system is used in Nokia Mobile Phones and how it works? 11 Differentiate FAT, FAT32 and NTFS 12 Which operating system is used to handle computer networks, how it works on LAN 13 Compare File Security mechanism of windows 98 with windows XP 14 Compare File Security mechanism of windows ME with windows XP 15 Compare File Security mechanism of windows 2000 with windows XP 16 How registry is helpful in managing security. 17 How operating system manages disk drives? How can we prevent disk damage?What is the process of disk sharing Individual
The term paper should be pedagogical in nature, explaining or illustrating a certain aspect of topic assigned.
3 / 12
Homework,Term Paper,Test 1
To assess student Memory Management, File Management, I/O and secondary performance in class management storage structure.
9 / 11