Operating Systems BCS303

Operating Systems BCS303

Module 1`

Introduction to operating systems, System structures: What operating systems do; Computer System organization; Computer System architecture; Operating System structure; Operating System operations; Process management; Memory management; Storage management; Protection and Security; Distributed system; Special-purpose systems; Computing environments.
Operating System Services: User – Operating System interface; System calls; Types of system calls; System programs; Operating system design and implementation; Operating System structure; Virtual machines; Operating System debugging, Operating System generation; System boot.

Module 2

Process Management: Process concept; Process scheduling; Operations on processes; Inter process communication Multi-threaded Programming: Overview; Multithreading models; Thread Libraries; Threading issues. Process Scheduling: Basic concepts; Scheduling Criteria; Scheduling Algorithms; Thread scheduling; Multiple-processor scheduling,

Module 3

Process Synchronization: Synchronization: The critical section problem; Peterson’s solution;
Synchronization hardware; Semaphores; Classical problems of synchronization;
Deadlocks: System model; Deadlock characterization; Methods for handling deadlocks; Deadlock
prevention; Deadlock avoidance; Deadlock detection and recovery from deadlock.

Module 4

Memory Management: Memory management strategies: Background; Swapping; Contiguous memory allocation; Paging; Structure of page table; Segmentation.
Virtual Memory Management: Background; Demand paging; Copy-on-write; Page replacement;
Allocation of frames; Thrashing.

Module 5

File System, Implementation of File System: File system: File concept; Access methods; Directory and Disk structure; File system mounting; File sharing; Implementing File system: File system structure; File system implementation; Directory implementation; Allocation methods; Free space management.Secondary Storage Structure, Protection: Mass storage structures; Disk structure; Disk attachment; Disk scheduling; Disk management; Protection: Goals of protection, Principles of protection, Domain of protection, Access matrix.

Previous Papers

7 Comments

  1. Can I just say what a relief to uncover someone who genuinely understands what they’re discussing online. You actually realize how to bring a problem to light and make it important. A lot more people really need to check this out and understand this side of your story. I was surprised that you aren’t more popular because you most certainly possess the gift.

  2. Oh my goodness! Impressive article dude! Thanks, However I am going through difficulties with your RSS. I don’t understand why I can’t subscribe to it. Is there anybody else having identical RSS issues? Anybody who knows the solution will you kindly respond? Thanks!!

  3. Hi there, I believe your website might be having internet browser compatibility problems. When I take a look at your site in Safari, it looks fine but when opening in IE, it’s got some overlapping issues. I simply wanted to give you a quick heads up! Besides that, excellent website!

  4. hello there and thank you for your information – I’ve certainly picked
    up something new from right here. I did however expertise a
    few technical issues using this site, as I experienced to
    reload the site many times previous to I could get it to load
    correctly. I had been wondering if your web host is OK? Not that I am complaining, but sluggish loading instances times will very frequently affect your placement in google and
    can damage your high quality score if advertising and marketing with Adwords.
    Anyway I am adding this RSS to my e-mail
    and can look out for a lot more of your respective interesting content.
    Make sure you update this again very soon.. Lista escape room

Leave a Reply

Your email address will not be published. Required fields are marked *