BCA Semester III - Operating System Concepts
Operating System Concepts
IT and Software ,Operating Systems and Servers,Linux
Lectures -85
Quizzes -1
Duration -10 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Unit I
- Introduction: Definition of Operating System, Computer-System Organization, ComputerSystem Architecture, Operating-System Structure, Operating System Structures: Operating- System
- Services, System Calls, Types of System Calls. Process: Process Concept, Process Scheduling,
- Operations on Processes, Inter process Communication, Threads: Overview, Multi core
- Programming, Multithreading Models, Threading Issues. CPU Scheduling: Basic Concepts,
- Scheduling Criteria, Scheduling Algorithms
Unit II
- Process Synchronization: Background, The Critical-Section Problem, Peterson’sSolution,
- Synchronization Hardware, Mutex Locks, Semaphores, Classic Problems of Synchronization, Monitors.
- Deadlocks: System Model, Deadlock Characterization, Methods for Handling Deadlocks,
- Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, Recovery from Deadlock.
Unit III
- Main Memory: Background, Swapping, Contiguous Memory Allocation, Segmentation, Paging,
- Structure of the Page Table.
- Virtual Memory: Background, Demand Paging, Page Replacement, Allocation of Frames,
- Thrashing, Memory-Mapped Files, Mass-Storage Structure, Overview of Mass- Storage
- Structure, Disk Structure, Disk Attachment, Disk Scheduling, Disk Formatting, RAID Structure
Unit IV
- File-System Interface: File Concept, Access Methods, Directory and Disk Structure, Protection.
- File-System Implementation: File-System Structure, File-System Implementation,
- Directory Implementation, Allocation Methods, Free-Space Management, Efficiency and Performance.
- I/O Systems: Overview, Application I/O Interface, Kernel I/O Subsystem, Transforming
- I/O Requests to Hardware Operations.
Unit V
- Protection: Goals of Protection, Principles of Protection, Domain of Protection Access Matrix,
- Implementation of the Access Matrix, Access Control, Revocation of Access Rights, CapabilityBased Systems.
- Security: The Security Problem, Program Threats, System and Network Threats,
- Cryptography as a Security Tool, User Authentication.
Prerequisites
No Prior knowledge Required.

Curriculum
Check out the detailed breakdown of what’s inside the course
Unit 1 - Introduction
45 Lectures
-
What is an operating system? 03:46 03:46
-
OS traditional view, an illusionist, a government. 05:02 05:02
-
OS salient features. 05:44 05:44
-
Computer system structure 01:50 01:50
-
Modern OS functionalities 06:05 06:05
-
OS principles 05:05 05:05
-
Layered computing systems 03:39 03:39
-
Layered design exceptions 05:29 05:29
-
Performance optimization in computing systems 03:42 03:42
-
OS user interface 03:16 03:16
-
OS interfaces 03:30 03:30
-
Protection 04:54 04:54
-
Kernel mode and user mode 03:48 03:48
-
System calls 05:29 05:29
-
Example system calls 02:31 02:31
-
Types of system calls 02:53 02:53
-
Traps 06:24 06:24
-
Application programming interface (API) 03:43 03:43
-
How APIs invoke system calls? 03:09 03:09
-
System call implementation 03:36 03:36
-
Parameter passing to system calls 04:30 04:30
-
When do processes relinquish CPU? 02:43 02:43
-
Process scheduling queuing diagram 03:37 03:37
-
Context switching 05:43 05:43
-
CPU scheduling basics 03:29 03:29
-
CPU-bound and IO-bound processes 03:46 03:46
-
Scheduling performance metrics 03:13 03:13
-
When would CPU scheduler run? 04:06 04:06
-
Turnaround time and waiting time 02:27 02:27
-
CPU scheduling algorithms types and goals 04:07 04:07
-
FCFS Scheduling 04:24 04:24
-
FCFS scheduling example 03:02 03:02
-
FCFS advantages and disadvantages 03:37 03:37
-
Shortest job first (SJF) scheduling 06:49 06:49
-
SJF advantages and disadvantages 03:11 03:11
-
Non-preemptive priority scheduling 04:38 04:38
-
Starvation 02:45 02:45
-
Shortest remaining time first (SRTF) scheduling 06:45 06:45
-
SRTF advantages and disadvantages 01:38 01:38
-
Activity---scheduling algorithms 06:51 06:51
-
Preemptive priority scheduling 07:14 07:14
-
Preemptive priority scheduling advantages and disadvantages 00:47 00:47
-
Round robin (RR) scheduling 03:15 03:15
-
RR scheduling example 05:31 05:31
-
RR scheduling advantages and disadvantages 03:41 03:41
Unit 2 - Process Synchronization:
19 Lectures

Unit 3 - Main Memory
7 Lectures

Unit 4 - File-System Implementation:
9 Lectures

Unit 5 - Protection and Security
4 Lectures

Unit-6 Assessments
1 Lectures

Instructor Details

Tutorialspoint
Simple and Easy Learning
Tutorials Point originated from the idea that there exists a class of readers who respond better to online content and prefer to learn new skills at their own pace from the comforts of their drawing rooms.
The journey commenced with a single tutorial on HTML in 2006 and elated by the response it generated, we worked our way to adding fresh tutorials to our repository which now proudly flaunts a wealth of tutorials and allied articles on topics ranging from programming languages to web designing to academics and much more.
40 million readers read 100 million pages every month
Our Text Library Content and resources are freely available and we prefer to keep it that way to encourage our readers acquire as many skills as they would like to. We don't force our readers to sign up with us or submit their details either to use our Free Text Tutorials Library. No preconditions and no impediments, Just Simply Easy Learning!
We have established a Digital Content Marketplace to sell Video Courses and eBooks at a very nominal cost. You will have to register with us to avail these premium services.
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now