Preview

Operating System

Satisfactory Essays
Open Document
Open Document
730 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Operating System
Chapter no | Topic | 1 | Introduction, Types , Computer System Overview | 2 | Operating System Structure, Components and Functions, Virtual Machine | 3 | Process Concept, Operation, Process scheduling, symmetric multi -processing, Cooperating Processes | 4 | Thread Concept, Thread Vs Process, IPC ,kernel ,microkernel | 5 | Scheduling, Types, Scheduling in batch, interactive and real-time systems (SJN, SJF, FIFO, LJN, round-robin, priority scheduling, and hybrid schemes). | 6 | Deadlock: Introduction, Characterization, Handling Deadlocks, Deadlock Prevention, Avoidance, Detection, Recovery. | 7 | Memory Management: introduction, logical and physical addresses, swapping, contiguous allocation, paging, segmentations | 8. | Virtual memory: demand paging, performance of demand paging, page replacement and algorithm, allocation of frames, thrashing | 9. | File system Interface: file concept, access method, directory structure, protection, consistency semantics | 10. | I/O system: introduction, I/O devices and its organization, Principles of I/O software and hardware I/o interfaces, Kernel I/O subsystem | 11. | Distributed system structure: introduction, distributed OS, | 12. | Robustness and Design Issue and characteristics | 13 | Synchronization in Distributed system | 14 | Synchronization in Distributed system contd.. | 15 | Case study Presentation |

COMP 307: Operating System
(Course Plan – September 2011)
3rd Year 1st Semester Instructor: | Santosh Khanal |
Course Webpage: http://ku.edu.np/cse/comp307
Prerequisite
Students should have a good enoughknowledge different programming language like C, C++ or Java. They also must have a good concept of data structure and algorithm. Course Description: | This course provides the general overview of operating system. This course discuss how the operating system works in process level, how it manages the resources and provide the system deadlock free. After completing this



References: * Operating Systems Internal and Design Principle 6th Edition William Stallings * Operating Systems Archer J Harris

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3 Os

    • 1341 Words
    • 6 Pages

    +• Scheduling: Any processor may perform scheduling, which complicates the task of enforcing a scheduling policy and assuring that corruption of the scheduler data structures is avoided. If kernel-level multithreading is used, then the opportunity exists to schedule multiple threads from the same process simultaneously on multiple processors.…

    • 1341 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    2. For direct-mapped cache, a main memory address is viewed as consisting of three fields. List and define the three fields.…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Week 5 Pos 355

    • 2010 Words
    • 9 Pages

    Memory management is an important part of an operating. The UNIX/Linux OS use numerous intricate algorithms for memory management which will permit the system to…

    • 2010 Words
    • 9 Pages
    Better Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IT 282 sylabus

    • 2660 Words
    • 11 Pages

    This course is an introduction to the fundamentals of personal computer operating systems for computer software configuration, file management, performance monitoring, optimization, maintenance, recovery, and security.…

    • 2660 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Operating System

    • 1099 Words
    • 5 Pages

    Answer: d. It redirects the output of one command to the input of another command.…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    References: 1. Andrews, J. (2009). A+ Guide to Managing and Maintaining Your PC, Comprehensive (6th ed.). : Cengage Learning, Inc.…

    • 4545 Words
    • 19 Pages
    Powerful Essays
  • Best Essays

    Lemley, B., Bascar T., & Kim, K. Virtual Memory. (1999). The Core of Information Technology.…

    • 2038 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Linex VS Mac VS Windows

    • 2819 Words
    • 12 Pages

    References: Stallings, W. (2012). Operating Sytems: Internals and Design Principles (7th ed.). Retrieved from The Univerisity of Phoenix EBook Collection.…

    • 2819 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Operating Systems

    • 1023 Words
    • 5 Pages

    9)A monolithic kernel is implemented as a single process with all elements sharing the same address space. (True)…

    • 1023 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    In the history of United States, there have been many people from different countries who want to immigrate from their home country to the United States. Mainly they are divided into groups based on geography such as North American, Asian, and etc. Today I will talk about the Southeast Asian group. Geographically, Southeast Asia is divided in to two regions, the Asian mainland and island arcs. The countries in the mainland region are Burma, Cambodia, Laos, Thailand, Vietnam and Peninsular Malaysia; while the maritime section consists of Brunei, East Malaysia, East Timor, Indonesia, Papua New Guinea, the Philippines, and Singapore.…

    • 514 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Assignment 1,Section I

    • 326 Words
    • 2 Pages

    Several methods have been devised that increase the effectiveness of memory management. Virtual memory systems separate the memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the effectively available amount of RAM using paging or swapping to secondary storage. The quality of the virtual memory manager can have an extensive effect on overall system performanc…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Jikjk

    • 937 Words
    • 4 Pages

    Midterm 2 Report • Highest: 100 • Lowest: 45 • Average: 83 1 Chapter 7 Input/Output Input/Output Problems • Wide variety of peripherals – Delivering different amounts of data – At different speeds – In different formats • Slower than CPU and RAM • Need I/O modules Input/Output Module Input/Output Module • Interface to CPU and Memory • Interface to one or more peripherals Generic Model of I/O Module I/O Module Function • • • • • Control & Timing CPU Communication Device Communication Data Buffering Error Detection I/O Module Diagram I/O Steps • CPU checks I/O module device status • I/O module returns status • If ready, CPU requests data transfer…

    • 937 Words
    • 4 Pages
    Good Essays
  • Good Essays

    File Management

    • 572 Words
    • 2 Pages

    File management in any computer system is a very crucial function. Proper file management alleviates everyday issues in file protection, to allow a smooth experience for users. Using file protection for operating systems, such as Unix, can be very easy and simple. Unix is a multiuser operating system that is used on a wide range of machines from powerful microcomputers to supercomputers (Stallings, 2012). In Unix, permissions are configured to allow owner(s) to define different permissions of files by restricting or permitting access where needed. These permissions are set to categories of owner, group, and other permissions. In early versions of file control and access for Unix, users where assigned a user identification number. These users also were members of groups and a group identification number identified each group. Now when a file is created by a user, not only is the file owned by a specific owner, but by the owners primary group as well. Attached to files are protection bits, where read, write, and execute permissions are specified and carried down to other users of the group/groups the owner belongs to. Anyone can see the issue that lies in this type of file access control. What happens when the owner desires only specific users or no users at all to have access to the created file?…

    • 572 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Applications of Computer

    • 3398 Words
    • 14 Pages

    The Aim: 1. To empower students by enabling them to build their own applications. 2. To introduce students to some effective tools to enable them to enhance their knowledge, broaden horizons, foster creativity, improve the quality of work and increase efficiency. 3. To enable students to learn to use the World Wide Web in order to gather knowledge and communicate with students and the academic community all over the world. 4. To enable students to learn to process words and numbers, analyze data, communicate ideas effectively and make the optimum use of computer resources. 5. To help students learn fundamental concepts of computing using object oriented approach in one computer language.…

    • 3398 Words
    • 14 Pages
    Powerful Essays

Related Topics