Book Details

Operating system

Operating system

Published by uLektz

Course Code:R42042

Author:uLektz

University: JNTU Kakinada

Regulation:2010

Categories:Computer Science

Format : ico_bookePUB3 (DRM Protected)

Type :eBook

FREE

Buy Now

Description :Operating system of R42042 covers the latest syllabus prescribed by JNTU Kakinada for regulation 2010. Author: uLektz, Published by uLektz Learning Solutions Private Limited.

Note : No printed book. Only ebook. Access eBook using uLektz apps for Android, iOS and Windows Desktop PC.

Topics
UNIT I COMPUTER SYSTEM AND OPERATING SYSTEM OVERVIEW

1.1 Overview of Computer System hardware

1.2 Instruction execution

1.3 I/O function - Interrupts - Memory hierarchy - I.O Communication techniques.

1.4 Operating System Objectives and functions

1.5 Evaluation of operating System - Example Systems

UNIT II PROCESS DESCRIPTION

2.1 Process Control-process states

2.2 Process and Threads

2.3 Examples of Process description and Control.

UNIT III CONCURRENCY

3.1 Principles of Concurrency - Mutual Exclusion

3.2 Software and hardware approaches - Semaphores - Monitors - Message Passing - Readers Writers Problem.

UNIT IV PRINCIPLES OF DEADLOCK

4.1 Deadlock prevention

4.2 Detection and avoidance dining philosophers problem

4.3 Example Systems

UNIT V MEMORY MANAGEMENT

5.1 Memory Management requirements

5.2 Loading programmes in to main memory

5.3 Virtual memory - Hardware and Control structures

5.4 OS Software - Examples of Memory Management

UNIT VI UNIPROCESSOR SCHEDULING

6.1 Types of Scheduling

6.2 Scheduling algorithms

6.3 I/O management and Disc Scheduling - I/O devices – organization – of I/O function - OS design issues - I/O buffering

6.4 Disk I/O – disk scheduling Policies

6.5 Examples System

UNIT VII FILE MANAGEMENT AND SECURITY

7.1 Overview of file management

7.2 File organization and access – File Directories – File sharing – record blocking

7.3 Secondary Storage Management

7.4 Example system

UNIT VIII SECURITY

8.1 Security threats -Protection

8.2 Intruders

8.3 Viruses

8.4 Trusted System

loading