Preview

Operating System

Satisfactory Essays
Open Document
Open Document
730 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Operating System
Chapter no | Topic | 1 | Introduction, Types , Computer System Overview | 2 | Operating System Structure, Components and Functions, Virtual Machine | 3 | Process Concept, Operation, Process scheduling, symmetric multi -processing, Cooperating Processes | 4 | Thread Concept, Thread Vs Process, IPC ,kernel ,microkernel | 5 | Scheduling, Types, Scheduling in batch, interactive and real-time systems (SJN, SJF, FIFO, LJN, round-robin, priority scheduling, and hybrid schemes). | 6 | Deadlock: Introduction, Characterization, Handling Deadlocks, Deadlock Prevention, Avoidance, Detection, Recovery. | 7 | Memory Management: introduction, logical and physical addresses, swapping, contiguous allocation, paging, segmentations | 8. | Virtual memory: demand paging, performance of demand paging, page replacement and algorithm, allocation of frames, thrashing | 9. | File system Interface: file concept, access method, directory structure, protection, consistency semantics | 10. | I/O system: introduction, I/O devices and its organization, Principles of I/O software and hardware I/o interfaces, Kernel I/O subsystem | 11. | Distributed system structure: introduction, distributed OS, | 12. | Robustness and Design Issue and characteristics | 13 | Synchronization in Distributed system | 14 | Synchronization in Distributed system contd.. | 15 | Case study Presentation |

COMP 307: Operating System
(Course Plan – September 2011)
3rd Year 1st Semester Instructor: | Santosh Khanal |
Course Webpage: http://ku.edu.np/cse/comp307
Prerequisite
Students should have a good enoughknowledge different programming language like C, C++ or Java. They also must have a good concept of data structure and algorithm. Course Description: | This course provides the general overview of operating system. This course discuss how the operating system works in process level, how it manages the resources and provide the system deadlock free. After completing this



References: * Operating Systems Internal and Design Principle 6th Edition William Stallings * Operating Systems Archer J Harris

You May Also Find These Documents Helpful

  • Powerful Essays

    2. For direct-mapped cache, a main memory address is viewed as consisting of three fields. List and define the three fields.…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Os

    • 1341 Words
    • 6 Pages

    +• Scheduling: Any processor may perform scheduling, which complicates the task of enforcing a scheduling policy and assuring that corruption of the scheduler data structures is avoided. If kernel-level multithreading is used, then the opportunity exists to schedule multiple threads from the same process simultaneously on multiple processors.…

    • 1341 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    IT 282 sylabus

    • 2660 Words
    • 11 Pages

    This course is an introduction to the fundamentals of personal computer operating systems for computer software configuration, file management, performance monitoring, optimization, maintenance, recovery, and security.…

    • 2660 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Operating System

    • 1099 Words
    • 5 Pages

    Answer: d. It redirects the output of one command to the input of another command.…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Assignment 1,Section I

    • 326 Words
    • 2 Pages

    Several methods have been devised that increase the effectiveness of memory management. Virtual memory systems separate the memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the effectively available amount of RAM using paging or swapping to secondary storage. The quality of the virtual memory manager can have an extensive effect on overall system performanc…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Midterm 2 Solutions

    • 1903 Words
    • 8 Pages

    1. Consider a 32-bit machine with 128 MB of physical memory, that uses virtual memory and demand paging for memory management. If the page size is 4 KB, answer the following questions. (Note: For ease of calculation, you can assume 1K=1000, 1M=1000K, etc.) (a) (3 pts) How many physical frames are there in the system? Ans: 128M = 32K 4K (b) (3 pts) What is the maximum number of pages that a process can have in its virtual address space? Ans: The amount of virtual address space addressable by each process = 232 = 4GB. Therefore, maximum number of pages = 4G = 1M 4K (c) (12 pts) Suppose the page table for a process P contains the following entries. Page No. 3 2 1 0 Frame No. 1 3 4 7…

    • 1903 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    References: 1. Andrews, J. (2009). A+ Guide to Managing and Maintaining Your PC, Comprehensive (6th ed.). : Cengage Learning, Inc.…

    • 4545 Words
    • 19 Pages
    Powerful Essays
  • Best Essays

    Mann, D. (1992, November 2). Speed system operation by matching CPU to need: understanding the…

    • 2038 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Linex VS Mac VS Windows

    • 2819 Words
    • 12 Pages

    References: Stallings, W. (2012). Operating Sytems: Internals and Design Principles (7th ed.). Retrieved from The Univerisity of Phoenix EBook Collection.…

    • 2819 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Operating Systems

    • 1023 Words
    • 5 Pages

    9)A monolithic kernel is implemented as a single process with all elements sharing the same address space. (True)…

    • 1023 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Jikjk

    • 937 Words
    • 4 Pages

    Midterm 2 Report • Highest: 100 • Lowest: 45 • Average: 83 1 Chapter 7 Input/Output Input/Output Problems • Wide variety of peripherals – Delivering different amounts of data – At different speeds – In different formats • Slower than CPU and RAM • Need I/O modules Input/Output Module Input/Output Module • Interface to CPU and Memory • Interface to one or more peripherals Generic Model of I/O Module I/O Module Function • • • • • Control & Timing CPU Communication Device Communication Data Buffering Error Detection I/O Module Diagram I/O Steps • CPU checks I/O module device status • I/O module returns status • If ready, CPU requests data transfer…

    • 937 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Secondary storage is a very significant component of a computer’s operating environment. It provides an important large storage space that can permanently hold systems software and any other desired user data. Secondary storage can also be utilized as a backup to ensure that the computer system is reliable and that data carried is safe. In addition, secondary storage also known as the Disk system supports the operations of the main memory. Therefore, we can say that the optimal performance of the disk is crucial since it affects the overall operation of the system (Silberschatz, Galvin and Gagne). To be able to read or write a sector of the disk, the disk arm needs to first and foremost search for…

    • 2546 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    File Management

    • 572 Words
    • 2 Pages

    File management in any computer system is a very crucial function. Proper file management alleviates everyday issues in file protection, to allow a smooth experience for users. Using file protection for operating systems, such as Unix, can be very easy and simple. Unix is a multiuser operating system that is used on a wide range of machines from powerful microcomputers to supercomputers (Stallings, 2012). In Unix, permissions are configured to allow owner(s) to define different permissions of files by restricting or permitting access where needed. These permissions are set to categories of owner, group, and other permissions. In early versions of file control and access for Unix, users where assigned a user identification number. These users also were members of groups and a group identification number identified each group. Now when a file is created by a user, not only is the file owned by a specific owner, but by the owners primary group as well. Attached to files are protection bits, where read, write, and execute permissions are specified and carried down to other users of the group/groups the owner belongs to. Anyone can see the issue that lies in this type of file access control. What happens when the owner desires only specific users or no users at all to have access to the created file?…

    • 572 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Memory Management Paper

    • 434 Words
    • 2 Pages

    Now in Linux OS the memory manager implements demand paging with a copy-on-write strategy relying on the 386's paging support. A process acquires its page tables…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Applications of Computer

    • 3398 Words
    • 14 Pages

    The Aim: 1. To empower students by enabling them to build their own applications. 2. To introduce students to some effective tools to enable them to enhance their knowledge, broaden horizons, foster creativity, improve the quality of work and increase efficiency. 3. To enable students to learn to use the World Wide Web in order to gather knowledge and communicate with students and the academic community all over the world. 4. To enable students to learn to process words and numbers, analyze data, communicate ideas effectively and make the optimum use of computer resources. 5. To help students learn fundamental concepts of computing using object oriented approach in one computer language.…

    • 3398 Words
    • 14 Pages
    Powerful Essays

Related Topics