Lovely Professional University,Punjab Format For Instruction Plan [for Courses with Lectures and Labs
Course No
Cours Title
Course Planner
CSE316
OPERATING SYSTEMS
11057 :: Gaurav Pushkarana
Text Book:
Other Specific Book:
Lectures Tutorial Pr Practical 4
0
0
1 Galvin & Silberschatz,Title: Operating System Principles,Publishers: John Wiley & sons Inc, 7th Edition, Year of Publication: 2007
2 A.S. Tanenbaum : Operating System : Design and Implementation, Prentice Hall 3 D M Dhamdhere, Operating System, Tata Mcgraw Hill 4 Kanetkar Yashwant, “UNIX Shell Programming”, BPB Publications.
Other Reading Sr No
Credits
Jouranls Jouranls atricles atricles a as s compulsar compulsary y readings readings (specifi (specific c articles, articles, Complet Complete e reference) reference) 5 http://scipub.org/scipub/index.ph http://scipub.org/scipub/index.php p 6 Marshall Kirk McKusick, William N. Joy, Samuel J. Leffler, Robert S. Fabry, “A Fast File System for UNIX” , University of California, Berkeley. 7 Lenine, G: “Deadlock Review” 2003 http://www.dau.mil/pubs/pm/pmpdf98/and http://www.dau.mil/pubs/pm/pmpdf98/andersma.pdf ersma.pdf 8 http://citeseer.ist.psu.edu/cis?q= http://citeseer.ist.psu.edu/cis?q=operating+system operating+system 9 Zahorjan, J and McCann,C: “ Processor Processor scheduling in shared-memory shared-memory multiprocessors”1999.
Relevant Websites Sr. No No. (Web ad adress) (o (only if if re relevant to to th the co courses)
Salient Fe Features
10 ww www.os-book.com
e-books and reading material
11 http: http://cod //codex.cs ex.cs.yale. .yale.edu/a edu/avi/os vi/os-book -book/os7/ /os7/slide slidedir/ dir/ index.html index.html
ppt and pdf documents documents of Galvin Gagne Gagne Silberschatz, Silberschatz, “Operati “Operating ng System Concepts Concepts”, ”,
12 www.softlookup.com/tutorial/os.asp
On-line tutorials
13 williamstallings.com/OS4e.html
e-books and reading material
4
14 www.pdf-search-engine.com/operating-systempdf. html
Reading material
15 www.OreillySchool.com
Online Unix Tutorial Courses
16 http://www.pdf-search-engine.com/operating-systempdf. html
e-books and reading material
17 http://www.opensolaris.com/opensolaris_datasheet.pdf
All relevant information regarding SOLARIS OS
18 www.pdf-search-engine.com/sco-unix-pdf.html
All relevantinformation regarding SCO UNIX OS
Detailed Plan For Lectures Week Number Lecture Number Lecture Topic
Chapters/Sections of Pedagogical tool Textbook/other Demonstration/case reference study/images/anmatio n ctc. planned
Part 1 Week 1
Week 2
Week 3
Lecture 1
Introduction: Operating System Meaning, Supervisor ->Reference :1,1.1 ; & User mode 1.2 ; 1.5
Lecture 2
Introduction: Types of Operating System: Simple ->Reference :1,1.3 ; batch Systems, multiprogramming, multiprocessing, 1.4 ; 1.11 multitasking, parallel, distributed and RTOS.
Lecture 3
Introduction: Operating System operations & Functions
->Reference :1,1.5 ; 1.6 ; 1.7 ; 1.8 ; 1.9
Lecture 4
System Structures: Operating system services
->Reference :1,2.1 ; 2.2
Lecture 5
System Structures: system calls, types of system calls, system programs
->Reference :1,2.3 ; 2.4 ; 2.5
Lecture 6
System Structures: Kernel Structures: Monolithic, layered structure, microkernel, exokernel,virtual machine
->Reference :1,2.7 ; 2.8
Lecture 7
Processes: Process concept, Life Cycle, PCB, Operation on Processes
->Reference :1,3.1 ; 3.2 ; 3.3
Lecture 8
Processes: Cooperating Processes, Inter Process communication
->Reference :1,3.4
Lecture 9
Processes: Process Communication in Client Server ->Reference :1,3.6 Environment
Lecture 10
Threads: Concept of Thread, Kernel Level & User level threads.
->Reference :1,4.1 ; 4.2
Lecture 11
Threads: Multithreading, Thread libraries
->Reference :1,4.3
Demonstration of windows XP
Week 3
Lecture 12
Threads: Threading Issues
->Reference :1,4.4
Week 4
Lecture 13
Scheduling: Scheduling Criteria,Types of scheduling,
->Reference :1,5.1 ; 5.2
Lecture 14
Scheduling algorithm- FCFS, SJF
->Reference :1,5.3
Lecture 15
Scheduling: Scheduling algorithm - Priority Scheduling, Round Robin Scheduling,
Lecture 16
Scheduling: Multiple-level queue Scheduling, Multiple Processor , Thread scheduling
->Reference :1,5.3 ; 5.4 ; 5.5
Lecture 17
Scheduling: Multiprocessor Scheduling algorithm
->Reference :1,5.4
Lecture 18
Scheduling: Thread Scheduling
->Reference :1,5.5
Lecture 19
Process Synchronization: Critical Section problem
->Reference :1,6.1 ; 6.2
Lecture 20
Process Synchronization: Semaphores, monitors
->Reference :1,6.5 ; 6.7
Lecture 21
Deadlock: Deadlock characterization, Handling of deadlocks- deadlock prevention
->Reference :1,7.1 ; 7.2 ; 7.3 ; 7.4
Images showing dead lock situation http://cs.colgate.ed u/CoursePages/w ebcoursepics/CO SC440.jpg
Lecture 22
Deadlock: Handling of deadlocks- Avoidance
->Reference :1,7.5
Simulator for Dead Lock handling http://www.ontko.c om/moss/#deadlo ck
Lecture 23
Deadlock: Handling of deadlocks detection
->Reference :1,7.6
Lecture 24
Deadlock: Recovery from deadlock
->Reference :1,7.7
Simulator of Operating System Job Scheduling http://www.freevbc ode.com/ShowC ode.asp?ID=4079
Part 2 Week 4
Week 5
Week 6
Week 7
Lecture 25
Memory Management: Logical & Physical address space, Swapping
->Reference :1,8.1 ; 8.2
Simulator for Memory Management http://www.ontko.c om/moss/#memory
Lecture 26
Memory Management: Contiguous memory allocation, paging
->Reference :1,8.3 ; 8.4
1,Figure88.7,8.8,8.9,8.10
Lecture 27
Memory Management: segmentation, virtual memory
->Reference :1,8.6 ; 9.1
1.http://esteve.tizo s.net/upload/TFC/a rch/segmentation.p ng 2. http://www.cs.uic.e du/~i385/CourseN otes/images/Chapt er8/8_22_Pentium Segmentation.jpg
Lecture 28
Memory Management: Demand paging.
->Reference :1,9.2
http://www.cs.nyu.e du/courses/spring0 5/G22.2250001/lectures/figs/s eg+page.png
MID-TERM Part 3 Week 8
Week 9
Week 10
Lecture 29
Memory Management: Page replacement algorithms
->Reference :1,9.4
Lecture 30
Memory Management: page allocation algorithms
->Reference :1,9.5
Lecture 31
Memory Management:Thrashing, Performance issues
->Reference :1,9.6
Lecture 32
File Management: File concepts, Access methods
->Reference :1,10.1 ; 10.2
Lecture 33
File Management: Directory structure, file system mounting
->Reference :1,10.3 ; 10.4
Lecture 34
File Management: File sharing, protection, Allocation Methods
->Reference :1,10.5 ; 10.6 ; 11.4
Lecture 35
File Management: Free space management, directory implementation
->Reference :1,11.3 ; 11.5
Lecture 36
I/O & Secondary Storage Structure: Disk scheduling ->Reference :1,12.4
Lecture 37
I/O & Secondary Storage Structure: Disk structure, swap space management
->Reference :1,12.1 ; 12.2 ; 12.6
Part 4 Week 10
Week 11
Week 12
Lecture 38
I/O & Secondary Storage Structure: Disk management, RAID structures
->Reference :1,12.5 ; 12.7
Lecture 39
I/O & Secondary Storage Structure: I/O H/W, Application I/O interface, Kernel I/O subsystem
->Reference :1,13.1 ; 13.2 ; 13.3 ; 13.4
Lecture 40
Protection and Security: Need for Security, Secure Software Systems, different Security Environments
->Reference :1,14.1 ; 14.2 ; 15.1
Lecture 41
Protection and Security: Security Vulnerability like buffer overflow, trapdoors, backdoors, cache poisoning
->Reference :1,15.2
Lecture 42
Protection and Security: Access control based Security Systems Access control models, Implementing the Access control matrix
->Reference :1,14.4 ; 14.5 ; 14.6
Lecture 43
Protection and Security: Authentication, Password based Authentication, Password Maintenance, Secure Communication
->Reference :1,18.5
Lecture 44
Protection and Security: Application Security subversive codes, Attack types, Virus, Application Security Approaches.
->Reference :1,18.2 ; 18.3
Lecture 45
Protection and Security: Cryptography as a security ->Reference :1,15.7 tools, firewalling to protect systems and networks.
Lecture 46
Distributed File Systems: Types of Distributed OS, naming and transparency, Remote file system, overview of distributed coordination
->Reference :1,16.2 ; 17.2 ; 17.3 ; overview of ch-18
Lecture 47
Case Study:Windows OS
->Reference :1,ch-22
Lecture 48
Case Study: Linux and Unix OS
->Reference :1,ch-21
Lecture 49
Influential operating systems: IBM OS/360,CTSS
->Reference :1,23.6 ; 23.8
Lecture 50
Multimedia systems: network management, CPU scheduling
->Reference :1,20.1 ; 20.6
Spill Over Week 13
Details of homework and case studies
Homework No.
Objective
Topic of the Homework
Nature of homework (group/individuals/field work
Evaluation Mode
Allottment / submission Week
TEST 1
TEST 1
All topics covered from week 1 to week 5
Individual
Offline
6/6
TEST 2
TEST 2
All topics covered from week 6 to week 9
Individual
Offline
10 / 10
TEST,Term Paper 3
Term Paper
As per plan
Group
offline
3/9
Scheme for CA:out of 100* Component
Frequency
TEST,Term Paper
Out Of 2
Each Marks Total Marks 3
Total :-
10
20
10
20
* In ENG courses wherever the total exceeds 100, consider x best out of y components of CA, as explained in teacher's guide available on the UMS
List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper) Sr. No. Topic 1 Compare the MemoryManagement of Windows with Linux 2 Case Study: According to you which one among UNIX, LINUX and Windows, is best. 3 What should be done for proper working of your computer system? Give general guidelines 4 How windows operating system handles viruses? Write down various viruses that can cause serious damage to the computer system. 5 Compare CPU Scheduling of LINUX and UNIX. 6 Compare the MemoryManagement of UNIX with Linux 7 Compare Features of Windows 2000 with windows Vista 8 Compare Features of Windows 2000 with windows XP 9 Compare Features of Windows 2000 with windows 98 10 Which operating system is used in Nokia Mobile Phones and how it works? 11 Differentiate FAT, FAT32 and NTFS 12 Which operating system is used to handle computer networks, how it works on LAN 13 Compare File Security mechanism of windows 98 with windows XP
14 Compare File Security mechanism of windows ME with windows XP 15 Compare File Security mechanism of windows 2000 with windows XP 16 How registry is helpful in managing security. 17 How operating system manages disk drives? How can we prevent disk damage?What is the process of disk sharing