Book Details

Operating System (Record blocking, Security)

Operating System (Record blocking, Security)

Published by uLektz

Course Code : ULZ0072
Author : uLektz
University : General for All University
Regulation : 2017
Categories : Computer Science
Format : ico_bookePUB3 (DRM Protected)
Type :

eBook

FREE

Buy Now

Description :Operating System (Record blocking, Security) of ULZ0072 covers the latest syllabus prescribed by General for All University for regulation 2017. Author: uLektz, Published by uLektz Learning Solutions Private Limited.

Note : No printed book. Only ebook. Access eBook using uLektz apps for Android, iOS and Windows Desktop PC.

Topics
UNIT I COMPUTER SYSTEM AND OPERATING SYSTEM OVERVIEW

1.1 Overview of Computer System hardware

1.2 Instruction execution

1.3 I/O function - Interrupts - Memory hierarchy - I.O Communication techniques.

1.4 Operating System Objectives and functions

1.5 Evaluation of operating System - Example Systems

UNIT II PROCESS DESCRIPTION

2.1 Process Control-process states

2.2 Process and Threads

2.3 Examples of Process description and Control.

UNIT III CONCURRENCY

3.1 Principles of Concurrency - Mutual Exclusion

3.2 Software and hardware approaches - Semaphores - Monitors - Message Passing - Readers Writers Problem.

UNIT IV PRINCIPLES OF DEADLOCK

4.1 Deadlock prevention

4.2 Detection and avoidance dining philosophers problem

4.3 Example Systems

UNIT V MEMORY MANAGEMENT

5.1 Memory Management requirements

5.2 Loading programmes in to main memory

5.3 Virtual memory - Hardware and Control structures

5.4 OS Software - Examples of Memory Management

UNIT VI UNIPROCESSOR SCHEDULING

6.1 Types of Scheduling

6.2 Scheduling algorithms

6.3 I/O management and Disc Scheduling - I/O devices – organization – of I/O function - OS design issues - I/O buffering

6.4 Disk I/O – disk scheduling Policies

6.5 Examples System

UNIT VII FILE MANAGEMENT AND SECURITY

7.1 Overview of file management

7.2 File organization and access – File Directories – File sharing – record blocking

7.3 Secondary Storage Management

7.4 Example system

UNIT VIII SECURITY

8.1 Security threats -Protection

8.2 Intruders

8.3 Viruses

8.4 Trusted System

loading