Department of Information Technology. Operating Systems III B.Tech -I Sem
|
|
|
- Camron McDowell
- 9 years ago
- Views:
Transcription
1 Department of Information Technology Operating Systems III B.Tech -I Sem K.Roshan Assoc. Professor J.B.Institute of Engg & Technology Yenkapally, Moinabad(Mandal) Himathnagar(post),Hydreabad
2 Results Target Total Strength of the Class: 50 S. No Class / Division No. of Students a. First Class with Distinction 30 b. First Class 15 c. Pass Class 5 Method of Evaluation a. Internal Examination 2 b. Unit Wise Assignments 4 c. Descriptive Exam 2 d Objective 2 e. Final Examination 1 Page: 2
3 JNTU Syllabus Unit I Unit II Unit III Unit IV Unit V Unit - VI Unit - VII Unit - VIII Operating Systems over view, OS Functions, protection and security, Distributed Systems, Special purpose systems. OS structure, OS services And System calls, System programs, OS generations Process management, Process concepts and threads, scheduling criteria, algorithms their evaluation, Threads scheduling, case studies UNIX, Linux, Windows Concurrency-Process synchronization, the critical section problem, semaphores, Paterson s solution, Synchronization Hardware, classic problems of Synchronization, monitors, synchronization examples, atomic transactions. case studies LINUX,UNIX,WINDOWS Memory management swapping, contiguous memory allocations, paging, structure of the page table, segmentation, virtual memory demand paging, page replacement algorithms, Allocation of frames, thrashing. case studies UNIX, LINUX,WINDOWS Principles of deadlocks- system model, deadlock characterization,deadlock prevention,detection and avoidance, recovery from deadlock. File system interface the concept of file, access methods Directory structure, File system mounting, file sharing and protection, File system implementation File system structure and implementation Directory implementation allocation methods,free space management, efficiency and performance. Case studies UNIX,LINUX, WINDOWS Mass storage structure over view of mass storage structure disk structure,disk attachment, disk scheduling swap-space management, RAID structure, stable- storage implementation, Tertiary storage structure. I/O systems-hardware, application I/O subsystem, Transforming I/O requests to Hardware operations, STREAMS, performance. Protection- Protection, Goals of Protection, Principles of Protection, Domain of protection Access Matrix, Implementation of Access Matrix, Access control, Revocation of Access Rights, Capability- Based systems, Language- Based Protection. Security- The security problem, program threats, system and network threats cryptography as a security tool, user authentication, implementing security defenses, firewalling to protect systems and networks, computer security classifications, case studies UNIX, Linux, Windows. Guidelines to Students Where will this subject help? 1. xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. Page: 3
4 Books / Material Text Books 1. Operating System Concepts- Abraham Silberchatz, Peter B, Galvin, Greg Gagne, 8 th edition, John Wiley. 2. Operating Systems- A Concept based Approach- D. M. Dhamdhere, 2 nd Edition, TMH. Suggested / Reference Books 1. Operating Systems- Internals and Design Principles, Stallings, sixth Edition-2009, Pearson education. 2. Modern Operating Systems, Andrew S Tanenbaum 2 nd edition PHI. 3. Principles of Operating Systems, B. L. Stuart, Cengage learning, India Edition. 4. Operating Systems, A. S.Godbole,2 nd Edition, TMH. 5. An Introduction to Operating Systems, P.C.P. Bhatt, PHI. 6. Operating Systems, G. Nutt, N. Chaki and S. Neogy.3 rd Edition, Pearson Education. 7. Operating Systems, R. Elmasri, A. G. Carrick and D. Levine, Mc Graw Hill. 8. Operating Systems, S. Haldar, A. A. Aravind, Pearson Education Course Schedule Number of Hours / lectures available in this Semester / Year Distribution of Hours Unit Wise Unit Topic Total No. of Hours I Operating systems overview 08 II Process management 07 III Concurrency 09 IV Memory management 08 V Principle of Deadlock 05 VI File system interface 09 VII Mass storage structure 08 Page: 4
5 VIII Protection and Security 07 Review of topic question papers 4 Total 65 Topic wise Coverage: Unit I: Operating Systems over view LEARNING OBJECTIVES: After Explain the aim of operating system Learn the overview of computer system hardware Learn about handheld devices and real-time systems Learn the operating system functions Learn about symmetric and asymmetric multiprocessing Learn between client-server and peer-to-peer models of distributed systems Analyze essential properties of different types of operating systems Learn about major activities of an OS with regard to file management Analyze operating system protection and security factors Learn about models of inter process communication List the various memory hierarchy devices and differentiate them LECTURE PLAN: Total no_ of classes: 08 Lecture No. Unit No. Topic Text Book and References 1. 1 Operating Systems over view T1, R OS functions, T1, R protection and security T1, R Distributed Systems, T1, R Special purpose systems. T1, R T1, R2 And System calls 7. 1 OS services, OS structure T1, R System programs, OS generations T2, R4 ASSIGNMENT-1 1. Define OS and explain about functions of OS briefly 2. Explain about storage structure and I/O structure Page: 5
6 3. Explain evolution of OS 4. Explain about protection and security aspects 5. Explain about OS structure 6. Explain about system boot? Explain about VMware architecture 7. UNIT-II : Process Management LEARNING OBJECTIVES: After studying this unit, Student should be able to : What common events lead to the creation of a process List three categories of information in a process control block What are the steps performed by an OS to create a new process Identify different process states Learn about short term, medium term and long term scheduling Learn about context and process switching Learn about process creation and process states in UNIX, LINUX and WINDOWS Distinguish between thread and process Learn about benefits of multithreaded programming and their models Learn about Pthreads Learn about threads in Unix, Linux and Windows Learn about types of CPU scheduling and their criteria for being the best with examples LECTURE PLAN: Total No_ of Classes: Process management, Process concepts and threads, T2, R scheduling criteria, T2, R algorithms their evaluation, T2, R T2, R2 Threads scheduling, 13 2 T2, R2 case studies UNIX, 14 2 case studies Linux, Windows T2, R2 (End of Unit II) : Total Classes 7 ASSIGNMENT-II 1 Differentiate the following i) Process switching versus Context switching 2 Discuss the attributes of a process.describe the typical elements of process control block 3 Discuss the following: a)user-level threads b)kernel-level threads c)multi-threading 4 a) Explain about all the states of a process with a neat diagram b) Explain about all CPU scheduling algorithms with examples 5 Explain about process creation and termination in UNIX Page: 6
7 6 Explain about multithreading models 7 Explain about the types of schedulers 8 Explain Fair-share scheduling policy with an appropriate example. Compare its performance with any other scheduling policy. UNIT-III : Concurrency LEARNING OBJECTIVES: Introduction to concept of concurrency and the implication of the execution of multiple concurrent processes To cite the basic requirements of mutual exclusion for concurrent processing Explain the various software and hardware approaches to achieve mutual exclusion Examine about semaphores, monitors and message passing Two classic problems in concurrency are used to illustrate the concepts Learn about concurrent atomic transactions Synchronization in UNIX, LINUX and WINDOWS LECTURE PLAN: Total no_ of classes: Concurrency-Process synchronization, the critical section problem, T2, R semaphores, Paterson s solution, Synchronization Hardware, T2, R monitors, synchronization examples, T2, R classic problems of Synchronization, atomic transactions. T2, R case studies UNIX T2, R case studies LINUX T2, R2 case studies WINDOWS ASSIGNMENT-3 1. What are the principles of concurrency and explain the execution of the concurrent process with an example. 2. What is a semaphore? Define the binary semaphore primitives and explain semaphore mechanism with an e.g. 3. What are the requirements for mutual exclusion? Explain in detail 4. What design and management issues are raised by the existence of concurrency? Point out how. 5). a)write the program for mutual Exclusion using semaphores Explain about infinite buffer producer/consumer problem for concurrent processing which uses binary semaphores the issues of speed independence can be addressed Page: 7
8 UNIT-IV: Memory management LEARNING OBJECTIVES: After studying this unit, student should be able to : Visualize the need to study memory management in operating systems List the memory management requirements Illustrate about loading programs into main memory Discuss about different memory management techniques Define what virtual memory is and describe it Examine the application of virtual memory Define the hardware and control structures Explain about OS software Page replacement algorithms with examples Memory management in UNIX, LINUX and WINDOWS environment LECTURE PLAN: Total No_ of Classes: Memory management swapping, contiguous memory allocations T2, R paging, structure of the page table, T2, R segmentation, virtual memory demand paging, T2, R Page replacement algorithms, Allocation of frames, thrashing. T2, R case studies UNIX, T2, R case studies Linux, Windows T2, R2 (End of Unit II) : Total Classes 7 ASSIGNMENT-4 1. Explain with a neat sketch i) Address translation in a segmentation system ii) Address translation in a paging system 2. i) Discuss the differences between a pure paging and demand segmentation virtual memory systems. What are the pros and cons of each scheme? ii) What are the three main issues of implementing a virtual memory? iii) Comment on the relative merits of using a local versus a global page replacement policy 3. State and explain the various page replacement algorithms in detail? 4. a) Differentiate between demand cleaning and pre-cleaning b) What is the difference between resident set and a working set c) Explain with suitable examples about page replacement algorithms 5. Write short notes on page table structure, Translation look aside buffer, Segmentation, paging. Page: 8
9 UNIT-V: Principles of Deadlock LEARNING OBJECTIVES: After studying this unit, student should be able to : Review the principles of deadlock Describe methods that an operating system can use to deal with deadlock problem Discuss the conditions for deadlock Identify tool in characterizing the allocation of resources to processes i:e R.A.G. Analyze the Deadlock detection algorithm Learn the dining philosopher s problem Learn about I/O hardware, polling and interrupts Learn about DMA Learn about block, character and network devices Learn about STREAMS LECTURE PLAN: Total No_ of Classes: 28 5 Principles of deadlocks No. of classes required 29 5 System model Dead lock characterization deadlock prevention detection and avoidance recovery from deadlock. 1 ASSIGNMENT-5 1. Explain with a neat sketch i) Address translation in a segmentation system ii) Address translation in a paging system 2. i) Discuss the differences between a pure paging and demand segmentation virtual memory systems. What are the pros and cons of each scheme? ii) What are the three main issues of implementing a virtual memory? iii) Comment on the relative merits of using a local versus a global page replacement policy 3. State and explain the various page replacement algorithms in detail? 4. a) Differentiate between demand cleaning and pre-cleaning b) What is the difference between resident set and a working set c) Explain with suitable examples about page replacement algorithms 5. Write short notes on page table structure, Translation look aside buffer, Segmentation, paging. UNIT-VI: File systems interface 34 6 Directory structure, File system mounting, file sharing and T1, R2 protection, 35 6 File system structure and implementation, T Directory implementation T1, R2 Page: 9
10 37 6,free space management, T Efficiency and performance T File system implementation T1, R Case study UNIX T1, R Case Study Linux T1,R Case study windows T1, R (End of Unit VI) : Total Classes 9 ASSIGNMENT-6 1. What is deadlock? Prove that an unsafe state is not deadlock state. Explain the necessary conditions for the deadlocks. 2. What is deadlock avoidance? Explain process initiation denial and resource allocation denial in detail with example 3. What are the principles of deadlock? And explain in detail the two categories of resources 4. a)what are the conditions that must satisfy for deadlock occurrence and explain them b)is the deadlocks problem preventable? Justify your answer with example and diagram 5. What is the dining philosophers problem? Device an algorithm to solve the problem using semaphores 6. Write detailed notes on : a) Interrupts b) I/O communication techniques 7. Explain about devices in I/O interface 8. a)explain about kernel I/O subsystem b)explain about streams UNIT-VII: Mass storage structure LEARNING OBJECTIVES: After studying this unit, student should be able to : Learn about magnetic disk Learn about disk scheduling algorithms Learn about disk management Learn about swap space management in UNIX Learn about RAID in detail Know about stable storages Learn about tertiary storage structure LECTURE PLAN: Total No_ of Classes: Mass storage structure over view of mass storage structure No. of classes required 45 7 Disk structure disk attachment, disk scheduling swap-space 1 management I/O systems, I/O hardware, sub systems disk attachment, disk scheduling swap I/O systems 1 Page: 10
11 50. 7 disk scheduling swap RAID structure, stable- storage implementation, Tertiary storage structure Transforming I/O requests to Hardware operations, STREAMS, performance. ASSIGNMENT-7 1.(a) Explain various disk performance parameters. (b) Show that the use buffer can reduce the running time by at most a factor of two. 2. Suppose the head of a moving- head disk with 200 tracks, numbered 0 to 199, is currently serving a request at track 143 and has just finished a request at track 125. If the queue of requests is kept in FIFO order: 86, 147, 91, 177, 94, 150, 102, 175, 130. What is the total head movement to satisfy these requests for the following disk scheduling algorithms. (a) FCFS (b) Random (c) PRI (d) SCAN (e) SSTF (f) C- SCAN 3. (a) Discuss about N- step- SCAN policy for disk scheduling. (b) Explain how double buffering improves the performance than a single buffer for I/O. (c) Differentiate between logical I/O and device I/O. 4. (a) Bitmaps are not often used for main memory allocation. They are commonly used for disk space allocation. Speculate on why this is so. (b) Give an example of an application that could benefit from operating system support for random access to indexed files. 5. Explain about RAID technology UNIT -V111: Protection and Security LEARNING OBJECTIVES: After studying this unit, student should be able to : Examine the problems of protection and design a model for implementing protection To understand types of threats to security Identify and understand the different malicious programs Learn about access matrix, access control and access capability Learn about language based protection(java) Learn about security problems Learn about security threats(trojan horse, trap door, logic bomb) Learn about viruses Learn about network threats(worms, port scanning, DoS) Learn about cryptography Learn about USER Authentication Learn about intrusion detection, firewalls LECTURE PLAN: Total No_ of Classes: 7 Page: 11
12 53 8 Case Study-II-Linux System - Design Principles 54 8 Kernel modules, T1,R Process Management T1,R Scheduling Memory Management T1,R File Systems, Input and Output, T1,R Interposes Communication, T1,R Network Structure, Security T1,R1 60 (End of Unit VIII) : Total Classes 7 ASSIGNMENT-8: 1.Write short notes on a)viruses b)worms c) Logic bomb d)trap door 2.a) What are the security requirements of a computer and network. b) Explain different types of threats.c) Explain the computer system assets. 3. a) Who are the various classes of intruders. b) Discuss about intrusion techniques 4. Write short notes on a) intrusion detection b)password protection 5. How resources of a computer system is protected b)explain user and data oriented access control 6. (a) Discuss the password file protection mechanisms. DEPARTMENT OF INFORMATION TECHNOLOGY INDIVIDUAL TIME TABLE NAME OF THE FACULTY: K.Roshan Period Day/Ti L me Mon U N OS OS Tue OS C Wed OS H Thu NN NN Fri NN NN Sat OS Operating Systems (OS) Total no of theory classes : 06 Total no of practical classes : 06 Neural networks :04 Total no of classes : 16 Page: 12
13 J. B.Institue of Engineering & Techology II B.Tech Batch/I SEM (I-MID DESCRIPTIVE) BRANCH: INFORMATION TECHNOLOGY SUB: Operating Systems TIME: 60 MINUTES Marks: 10 SECTION-A Answer any TWO of the following: (2x5=10M) 1 Define OS and explain about functions of OS briefly Explain about storage structure and I/O structure 2 Explain evolution of OS 3 A)Explain about process creation and termination in UNIX B) Explain about multithreading models C)Explain about the types of schedulers 4 A)State and explain the various page replacement algorithms in detail? B)Differentiate between demand cleaning and pre-cleaning C)What is the difference between resident set and a working set OJ. B.Institue of Engineering & Techology II B.Tech Batch/I SEM (I-MID DESCRIPTIVE) BRANCH: INFORMATION TECHNOLOGY SUB: Operating Systems TIME: 60 MINUTES Marks: 10 SECTION-A Answer any TWO of the following: (2x5=10M) 1..A)What is deadlock? Prove that an unsafe state is not deadlock state. Explain the necessary conditions for the deadlocks. B)What is deadlock avoidance? Explain process initiation denial and resource allocation denial in detail with example C) What are the principles of deadlock? And explain in detail the two categories of resources 2. a)what are the conditions that must satisfy for deadlock occurrence and explain them b) Explain various disk performance parameters. c) Show that the use buffer can reduce the running time by at most a factor of two. 3..Write short notes on a)viruses b)worms c) Logic bomb d)trap door 4.a) What are the security requirements of a computer and network. b) Explain different types of threats.c) Explain the computer system assets. Page: 13
14 Marks for Internal Theory Examination ROLL.NO NAME OF THE STUDENT I MID (Des+Obj+Assign)) II MID Des+Obj+Assign)) Page: 14
Computer Science 4302 Operating Systems. Student Learning Outcomes
Computer Science 4302 Operating Systems Student Learning Outcomes 1. The student will learn what operating systems are, what they do, and how they are designed and constructed. The student will be introduced
Far-western University Central Office, Mahendranagar Operating System
Far-western University Central Office, Mahendranagar Operating System Course Title: Operating Systems Credit: 3+1 Course No: B.Sc. CS OS 231 hour 45+15 Nature of the Course: Theory + Lab Year: 2 nd, Semester:
Weighted Total Mark. Weighted Exam Mark
CMP2204 Operating System Technologies Period per Week Contact Hour per Semester Total Mark Exam Mark Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU 45 30 00 60 100 40 100 4 Rationale
Gildart Haase School of Computer Sciences and Engineering
Gildart Haase School of Computer Sciences and Engineering Metropolitan Campus I. Course: CSCI 6638 Operating Systems Semester: Fall 2014 Contact Hours: 3 Credits: 3 Class Hours: W 10:00AM 12:30 PM DH1153
CTE214 Operating Systems Syllabus
Course Details Department of Computer & Instructional Technology Teacher Education CTE214 Operating Systems Syllabus Course Name: Course Credits: 4 ECTS Credits: 6 Prerequisite: CTE112 (Introduction to
OPERATING SYSTEMS Internais and Design Principles
OPERATING SYSTEMS Internais and Design Principles FOURTH EDITION William Stallings, Ph.D. Prentice Hall Upper Saddle River, New Jersey 07458 CONTENTS Web Site for Operating Systems: Internais and Design
Chapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
Undergraduate Course Syllabus
College of Software Engineering Undergraduate Course Syllabus Course ID 311006040 Course Name Operating System Course Attribute Compulsory Selective Course Language English Chinese Credit Hour 4 Period
Operating Systems Principles
bicfm page i Operating Systems Principles Lubomir F. Bic University of California, Irvine Alan C. Shaw University of Washington, Seattle PEARSON EDUCATION INC. Upper Saddle River, New Jersey 07458 bicfm
Chapter 6, The Operating System Machine Level
Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General
Operating Systems OBJECTIVES 7.1 DEFINITION. Chapter 7. Note:
Chapter 7 OBJECTIVES Operating Systems Define the purpose and functions of an operating system. Understand the components of an operating system. Understand the concept of virtual memory. Understand the
Lesson Objectives. To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization
Lesson Objectives To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization AE3B33OSD Lesson 1 / Page 2 What is an Operating System? A
Operating Systems 4 th Class
Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science
2) What is the structure of an organization? Explain how IT support at different organizational levels.
(PGDIT 01) Paper - I : BASICS OF INFORMATION TECHNOLOGY 1) What is an information technology? Why you need to know about IT. 2) What is the structure of an organization? Explain how IT support at different
Operating System Tutorial
Operating System Tutorial OPERATING SYSTEM TUTORIAL Simply Easy Learning by tutorialspoint.com tutorialspoint.com i ABOUT THE TUTORIAL Operating System Tutorial An operating system (OS) is a collection
Operating Systems Overview
Operating Systems Overview No single definition, but many perspectives: Role in an overall system: Intermediary between computer hardware and everything else User view: Provides an environment, preferably
How To Understand And Understand An Operating System In C Programming
ELEC 377 Operating Systems Thomas R. Dean Instructor Tom Dean Office:! WLH 421 Email:! [email protected] Hours:! Wed 14:30 16:00 (Tentative)! and by appointment! 6 years industrial experience ECE Rep
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus
CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus Modality of Examination: The examination comprises of two papers, each carrying 100 marks. The first paper is General Overview
Chapter 11 I/O Management and Disk Scheduling
Operatin g Systems: Internals and Design Principle s Chapter 11 I/O Management and Disk Scheduling Seventh Edition By William Stallings Operating Systems: Internals and Design Principles An artifact can
Chapter 10 Case Study 1: LINUX
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 10 Case Study 1: LINUX History of UNIX and Linux UNICS PDP-11 UNIX Portable UNIX Berkeley UNIX Standard UNIX MINIX Linux UNIX/Linux Goals
Operating Systems, 6 th ed. Test Bank Chapter 7
True / False Questions: Chapter 7 Memory Management 1. T / F In a multiprogramming system, main memory is divided into multiple sections: one for the operating system (resident monitor, kernel) and one
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Introduction Have been around
Red Hat Linux Internals
Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Operating System Structures
Operating System Structures Meelis ROOS [email protected] Institute of Computer Science Tartu University fall 2009 Literature A. S. Tanenbaum. Modern Operating Systems. 2nd ed. Prentice Hall. 2001. G. Nutt.
Operating Systems. www.fetac.ie. Module Descriptor
The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act,
Chapter 2: OS Overview
Chapter 2: OS Overview CmSc 335 Operating Systems 1. Operating system objectives and functions Operating systems control and support the usage of computer systems. a. usage users of a computer system:
Principles of Operating Systems CS 446/646
Principles of Operating Systems CS 446/646 1. Introduction to Operating Systems a. Role of an O/S b. O/S History and Features c. Types of O/S Mainframe systems Desktop & laptop systems Parallel systems
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science
Operating Systems. Design and Implementation. Andrew S. Tanenbaum Melanie Rieback Arno Bakker. Vrije Universiteit Amsterdam
Operating Systems Design and Implementation Andrew S. Tanenbaum Melanie Rieback Arno Bakker Vrije Universiteit Amsterdam Operating Systems - Winter 2012 Outline Introduction What is an OS? Concepts Processes
Outline. Operating Systems Design and Implementation. Chap 1 - Overview. What is an OS? 28/10/2014. Introduction
Operating Systems Design and Implementation Andrew S. Tanenbaum Melanie Rieback Arno Bakker Outline Introduction What is an OS? Concepts Processes and Threads Memory Management File Systems Vrije Universiteit
Have both hardware and software. Want to hide the details from the programmer (user).
Input/Output Devices Chapter 5 of Tanenbaum. Have both hardware and software. Want to hide the details from the programmer (user). Ideally have the same interface to all devices (device independence).
POSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2)
RTOSes Part I Christopher Kenna September 24, 2010 POSIX Portable Operating System for UnIX Application portability at source-code level POSIX Family formally known as IEEE 1003 Originally 17 separate
Republic Polytechnic School of Information and Communications Technology C226 Operating System Concepts. Module Curriculum
Republic Polytechnic School of Information and Communications Technology C6 Operating System Concepts Module Curriculum Module Description: This module examines the fundamental components of single computer
Chapter 1: Introduction. Chapter 1: Introduction. Operating System Concepts, 7th Edition. Objectives
Chapter 1: Introduction Chapter 1: Introduction 1.1 What Operating Systems Do 1.2 Computer-System Organization 1.3 Computer-System Architecture 1.4 Operating-System Structure 1.5 Operating-System Operations
Operating System Software
Operating System Software Lecture 7 The operating system Defines our computing experience. First software we see when we turn on the computer, and the last software we see when the computer is turned off.
Introduction Disks RAID Tertiary storage. Mass Storage. CMSC 412, University of Maryland. Guest lecturer: David Hovemeyer.
Guest lecturer: David Hovemeyer November 15, 2004 The memory hierarchy Red = Level Access time Capacity Features Registers nanoseconds 100s of bytes fixed Cache nanoseconds 1-2 MB fixed RAM nanoseconds
OS OBJECTIVE QUESTIONS
OS OBJECTIVE QUESTIONS Which one of the following is Little s formula Where n is the average queue length, W is the time that a process waits 1)n=Lambda*W 2)n=Lambda/W 3)n=Lambda^W 4)n=Lambda*(W-n) Answer:1
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users
Computer-System Architecture
Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection General System Architecture 2.1 Computer-System Architecture 2.2 Computer-System
Lecture 25 Symbian OS
CS 423 Operating Systems Design Lecture 25 Symbian OS Klara Nahrstedt Fall 2011 Based on slides from Andrew S. Tanenbaum textbook and other web-material (see acknowledgements) cs423 Fall 2011 1 Overview
Operating Systems. Virtual Memory
Operating Systems Virtual Memory Virtual Memory Topics. Memory Hierarchy. Why Virtual Memory. Virtual Memory Issues. Virtual Memory Solutions. Locality of Reference. Virtual Memory with Segmentation. Page
How To Understand The History Of An Operating System
7 Operating Systems 7.1 Source: Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 7.2 Understand the role of the operating system.
SYSTEM ecos Embedded Configurable Operating System
BELONGS TO THE CYGNUS SOLUTIONS founded about 1989 initiative connected with an idea of free software ( commercial support for the free software ). Recently merged with RedHat. CYGNUS was also the original
Operating Systems PART -A
Subject Code: Hours/Week : 04 Total Hours : 52 I.A. Marks : 25 Exam Hours: 03 Exam Marks: 100 PART -A UNIT -1 INTRODUCTION TO OPERATING SYSTEMS, SYSTEM STRUCTURES: What operating systems do; Computer System
Operating System Components
Lecture Overview Operating system software introduction OS components OS services OS structure Operating Systems - April 24, 2001 Operating System Components Process management Memory management Secondary
Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
B.Sc. (Computer Science) First Year
B.Sc. (Computer Science) First Year Paper No. Title of Paper External Internal Assessment Maximum Pass Exam Durations Semester I I Computer Fundamentals & Programming 40 5 45 16 3hrs in C II Logical Organization
Real-Time Scheduling 1 / 39
Real-Time Scheduling 1 / 39 Multiple Real-Time Processes A runs every 30 msec; each time it needs 10 msec of CPU time B runs 25 times/sec for 15 msec C runs 20 times/sec for 5 msec For our equation, A
COURSE OUTLINE Survey of Operating Systems
Butler Community College Career and Technical Education Division Skyler Lovelace New Fall 2014 Implemented Spring 2015 COURSE OUTLINE Survey of Operating Systems Course Description IN 167. Survey of Operating
Operating system Dr. Shroouq J.
3 OPERATING SYSTEM STRUCTURES An operating system provides the environment within which programs are executed. The design of a new operating system is a major task. The goals of the system must be well
Operating Systems Prof. Ashok K Agrawala
CSMC 412 Operating Systems Prof. Ashok K Agrawala 2006 Ashok Agrawala 1.1 Silberschatz, Galvin and Gagne 2005 Dayalbagh Eductional Institute Welcome Review Syllabus Today read the warning about the size
CSC 2405: Computer Systems II
CSC 2405: Computer Systems II Spring 2013 (TR 8:30-9:45 in G86) Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Introductions Mirela Damian Room 167A in the Mendel Science Building [email protected]
Technical Properties. Mobile Operating Systems. Overview Concepts of Mobile. Functions Processes. Lecture 11. Memory Management.
Overview Concepts of Mobile Operating Systems Lecture 11 Concepts of Mobile Operating Systems Mobile Business I (WS 2007/08) Prof Dr Kai Rannenberg Chair of Mobile Business and Multilateral Security Johann
Real Time Programming: Concepts
Real Time Programming: Concepts Radek Pelánek Plan at first we will study basic concepts related to real time programming then we will have a look at specific programming languages and study how they realize
Total 24 9 24 550 225
Date: 30-03-2016 SCHEME OF INSTRUCTION & EXAMINATION B.E. IIIrd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER - I Syllabu Sl. s No Ref.. No. SUBJECT Scheme of Scheme of Examination Maximu Periods per
Devices and Device Controllers
I/O 1 Devices and Device Controllers network interface graphics adapter secondary storage (disks, tape) and storage controllers serial (e.g., mouse, keyboard) sound co-processors... I/O 2 Bus Architecture
File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
b. A program calls malloc to request more memory from the operating system. i.what system call would malloc use to request more memory of the OS?
CS 4410 Operating Systems Prelim II, Fall 2013 Profs. Sirer and van Renesse Name: NETID: This is a closed book examination. It is 10 pages long. You have 120 minutes. No electronic devices of any kind
Introduction. What is an Operating System?
Introduction What is an Operating System? 1 What is an Operating System? 2 Why is an Operating System Needed? 3 How Did They Develop? Historical Approach Affect of Architecture 4 Efficient Utilization
CS 525 Advanced Database Organization - Spring 2013 Mon + Wed 3:15-4:30 PM, Room: Wishnick Hall 113
CS 525 Advanced Database Organization - Spring 2013 Mon + Wed 3:15-4:30 PM, Room: Wishnick Hall 113 Instructor: Boris Glavic, Stuart Building 226 C, Phone: 312 567 5205, Email: [email protected] Office Hours:
VALLIAMMAI ENGINEERING COLLEGE
VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202
Memory Management Outline. Background Swapping Contiguous Memory Allocation Paging Segmentation Segmented Paging
Memory Management Outline Background Swapping Contiguous Memory Allocation Paging Segmentation Segmented Paging 1 Background Memory is a large array of bytes memory and registers are only storage CPU can
Chapter 1: Introduction. What is an Operating System?
Chapter 1: Introduction What is an Operating System? Mainframe Systems Desktop Systems Multiprocessor Systems Distributed Systems Clustered System Real -Time Systems Handheld Systems Computing Environments
QF01/0407-1.0 الخطة الدراسية كلية العلوم وتكنولوجيا المعلومات- برنامج الماجستير/ الوصف المختصر
Algorithms analysis and design(0102721). The course introduces students to a variety of computer problems and methods of their solutions. It enables students to assess the complexity of problems and algorithms.
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 6: Secondary Storage Systems Moving-head Disk Mechanism 6.2 Overview of Mass-Storage Structure Magnetic disks provide bulk of secondary storage of modern computers Drives rotate at 60 to 200 times
Chapter 12: Secondary-Storage Structure
Chapter 12: Secondary-Storage Structure Chapter 12: Secondary-Storage Structure Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space Management RAID
Chapter 1: Introduction. Operating System Concepts 9 th Edit9on
Chapter 1: Introduction Operating System Concepts 9 th Edit9on Silberschatz, Galvin and Gagne 2013 Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture
CHAPTER 15: Operating Systems: An Overview
CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint
Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems
Course Name: Linux Server Administration Course Code: PGDNA121 To understand the basic principles underlying Server Software Planning and Deploying Linux Server Manage the Servers Efficiently Fundamentals
This tutorial will take you through step by step approach while learning Operating System concepts.
About the Tutorial An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is a vital component
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
Chapter 19: Real-Time Systems. Overview of Real-Time Systems. Objectives. System Characteristics. Features of Real-Time Systems
Chapter 19: Real-Time Systems System Characteristics Features of Real-Time Systems Chapter 19: Real-Time Systems Implementing Real-Time Operating Systems Real-Time CPU Scheduling VxWorks 5.x 19.2 Silberschatz,
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
Linux Driver Devices. Why, When, Which, How?
Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may
CSE 544 Principles of Database Management Systems. Magdalena Balazinska Fall 2007 Lecture 5 - DBMS Architecture
CSE 544 Principles of Database Management Systems Magdalena Balazinska Fall 2007 Lecture 5 - DBMS Architecture References Anatomy of a database system. J. Hellerstein and M. Stonebraker. In Red Book (4th
Outline. File Management Tanenbaum, Chapter 4. Files. File Management. Objectives for a File Management System
Outline File Management Tanenbaum, Chapter 4 Files and directories from the programmer (and user) perspective Files and directory internals the operating system perspective COMP3231 Operating Systems 1
Performance Comparison of RTOS
Performance Comparison of RTOS Shahmil Merchant, Kalpen Dedhia Dept Of Computer Science. Columbia University Abstract: Embedded systems are becoming an integral part of commercial products today. Mobile
Operating System Today s Operating Systems File Basics File Management Application Software
Lecture Content Operating System Today s Operating Systems File Basics File Management Application Software Operating Systems and File Management 2 Operating Systems and File Management 3 Operating System
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
Chapter 2: Computer-System Structures. Computer System Operation Storage Structure Storage Hierarchy Hardware Protection General System Architecture
Chapter 2: Computer-System Structures Computer System Operation Storage Structure Storage Hierarchy Hardware Protection General System Architecture Operating System Concepts 2.1 Computer-System Architecture
Introduction. System Calls
TDDB68 Concurrent programming and operating systems Introduction. System Calls [SGG7/8/9] Chapter 1.1-1.7 Chapter 2.3-2.5 Overview of the major operating systems components Interrupts, Dual mode, System
Eleventh Hour Security+
Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Process Scheduling CS 241. February 24, 2012. Copyright University of Illinois CS 241 Staff
Process Scheduling CS 241 February 24, 2012 Copyright University of Illinois CS 241 Staff 1 Announcements Mid-semester feedback survey (linked off web page) MP4 due Friday (not Tuesday) Midterm Next Tuesday,
Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
Scaling Networking Applications to Multiple Cores
Scaling Networking Applications to Multiple Cores Greg Seibert Sr. Technical Marketing Engineer Cavium Networks Challenges with multi-core application performance Amdahl s Law Evaluates application performance
Software design (Cont.)
Package diagrams Architectural styles Software design (Cont.) Design modelling technique: Package Diagrams Package: A module containing any number of classes Packages can be nested arbitrarily E.g.: Java
Chapter 3: Operating Systems
Chapter 3: Operating Systems Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 3: Operating Systems 3.1 The History of Operating Systems
1. Computer System Structure and Components
1 Computer System Structure and Components Computer System Layers Various Computer Programs OS System Calls (eg, fork, execv, write, etc) KERNEL/Behavior or CPU Device Drivers Device Controllers Devices
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?
I/O Management. General Computer Architecture. Goals for I/O. Levels of I/O. Naming. I/O Management. COMP755 Advanced Operating Systems 1
General Computer Architecture I/O Management COMP755 Advanced Operating Systems Goals for I/O Users should access all devices in a uniform manner. Devices should be named in a uniform manner. The OS, without
A Deduplication File System & Course Review
A Deduplication File System & Course Review Kai Li 12/13/12 Topics A Deduplication File System Review 12/13/12 2 Traditional Data Center Storage Hierarchy Clients Network Server SAN Storage Remote mirror
Storage and File Structure
Storage and File Structure Chapter 10: Storage and File Structure Overview of Physical Storage Media Magnetic Disks RAID Tertiary Storage Storage Access File Organization Organization of Records in Files
Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems
Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system
