Oshandbook
Oshandbook
SCHOOL OF COMPUTING
HANDBOOK
5 Syllabus 8
8 Lesson Plan 11
12 Targets Planned 17
16 CLAP1 Assessment 19
                                           2
                             UNIVERSITY VISION
medicine, management and other areas of scholarship that will best serve the
UNIVERSITY MISSION
                                     3
                      SCHOOL OF COMPUTING VISION
To become a world class School in importing high quality education and in
providing students a unique learning and research experience in the field of
Computer Science and Engineering and its related fields.
    Graduates will have the ability to adapt, contribute and innovate new technologies and
      systems in the key domains of Computer Science and Engineering.
                                            4
                         PROGRAMME OUTCOMES (PO)
                                               5
PO 7: Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and the
need for sustainable development.
PO 8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities
and norms of the engineering practice.
PO 9: Individual and team work: Function effectively as an individual, and as a member or
leader in diverse teams, and in multidisciplinary settings.
PO 10: Communication: Communicate effectively on complex engineering activities with the
engineering community and with the society at large, such as being able to comprehend and
write effective reports and design documentation, make effective presentations, and give and
receive clear instructions
PO 11: Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
PO 12: Life-long learning: Recognise the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological change.
***
                                               6
                           ABOUT THE COURSE
***
                                       7
                                                                              SYLLABUS
                                                                                                                                                                                         Engineering Knowledge
CLR-4
                                                                                                                                                                                                                                                                                                                                                                                                Communication
         Name the various computer security techniques in windows and Linux
:
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PSO – 3
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PSO - 1
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PSO - 2
Course Learning Outcomes
                                                                                                                                                                                                                                                                                                                                                               Ethics
                               At the end of this course, learners will be able to:
(CLO):
CLO-1                                                                                                                                                                                                 3 3 2                                                                 2 -                                -                                 -                -               -                   -                           - 3                            -            -      -
        Use the appropriate concepts of operating system for resource utilization                              3 70 75
:
CLO-2                                                                                                                                                                                                 3 3 3                                                                 2 -                                -                                 -                -               -                   -                           - 3                            -            -      -
        Choose the relevant process and thread concepts for solving synchronization problems                   5 70 75
:
CLO-3                                                                                                                                                                                                 3 3 3                                                                 2 -                                -                                 -                -               -                   -                           - 3                            -            -      -
        Exemplify different types of scheduling algorithms and deadlock mechanism.                             5 70 75
:
CLO-4 Experiment the performance of different algorithms used in management of memory, file and I/O                                                                                                   3 3 3                                                                 2 -                                -                      -                             - -                           -                  -                          3                -            -      -
        and select the appropriate one.                                                                        4 70 75
:
CLO-5 Demonstrate different device and resource management techniques for memory utilization with                                                                                                     3 2 3                                                                2 -                                 -                                 -                -               -                   -                           - 3                            -            -      -
        security mechanisms                                                                                    3 70 75
:
Unit-1
Introduction, Computer-System Organization, Computer-System Architecture, Operating-System Structure, Operating-System Operations, Process Management, Memory Management,
Storage Management, Protection and Security, Kernel Data Structures, Computing Environments, Open-Source Operating Systems, Operating-System Services, User and Operating-System
Interface, System Calls, Types of System Calls, System Programs, Operating-System Design and Implementation, Operating-System Structure, Operating-System Debugging, Operating-
System Generation, System Boot.
Unit-2
PROCESS MANAGEMENT: Process Concept, Process Scheduling, Operations on Processes, Interprocess Communication, Communication in Client– Server Systems, Threads: Multicore
Programming, Multithreading Models, Thread Libraries, Implicit Threading, Threading Issues. Process Synchronization: The Critical-Section Problem, Peterson’s Solution, Synchronization
Hardware, Mutex Locks, Semaphores, Classic Problems of Synchronization, Monitors
Unit-3
CPU Scheduling: Basic Concepts, Scheduling Criteria, Scheduling Algorithms, Thread Scheduling, Multiple-Processor Scheduling, Real-Time CPU Scheduling. Deadlocks: System Model,
Deadlock Characterization, Methods for Handling Deadlocks, Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, Recovery from Deadlock
Unit-4
MEMORY MANAGEMENT: Main Memory, Swapping, Contiguous Memory Allocation, Segmentation, Paging, Structure of the Page Table. Virtual Memory: Introduction, Demand Paging,
Copy-on-Write, Page Replacement, Allocation of Frames, Thrashing, Memory-Mapped Files, Allocating Kernel Memory. STORAGE MANAGEMENT: Disk Structure, Disk Attachment, Disk
Scheduling, Disk Management, Swap-Space Management, RAID Structure. File-System Interface: File Concept, Access Methods, Directory and Disk Structure, File-System Mounting, File
Sharing, Protection. .
Unit-5
PROTECTION AND SECURITY: Goals of Protection, Principles of Protection, Domain of Protection, Access Matrix, Implementation of the Access Matrix, Access Control, Revocation of
Access Rights, Capability-Based Systems, Language-Based Protection, The Security Problem, Program Threats, System and Network Threats, Cryptography as a Security Tool, User
Authentication, Implementing Security Defenses, Firewalling to Protect Systems and Networks, Computer-Security
Classifications.
Lab 1: Operating system Installation, Basic Linux commands
Lab 2: Process Creation using fork() and Usage of getpid(), getppid(), wait() functions
Lab 3: Multithreading
Lab 4: Mutual Exclusion using semaphore and monitor
Lab 5: Reader-Writer problem
Lab 6: Dining Philosopher problem
Lab 7: Bankers Algorithm for Deadlock avoidance
Lab 8: FCFS and SJF Scheduling
Lab 9: Priority and Round robin scheduling
Lab 10: FIFO Page Replacement Algorithm
Lab 11: LRU and LFU Page Replacement Algorithm
Lab 12: Best fit and Worst fit memory management policies
Lab 13: Disk Scheduling algorithm
Lab 14: Sequential and Indexed file Allocation
Lab 15: File organization schemes for single level and two level directory
              1.    Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System    7.     https://nptel.ac.in/courses/106/105/106105214/
Learning            Concepts”, John Wiley & Sons (Asia) Pvt. Ltd, Tenth Edition, 2018            8.     https://nptel.ac.in/courses/106/106/106106144/
Resources     2.    RamazElmasri, A. Gil Carrick, David Levine, “Operating Systems – A Spiral    9.     https://nptel.ac.in/courses/106/102/106102132/
                    Approach “, Tata McGraw Hill Edition, 2010                                   10.    https://onlinecourses.nptel.ac.in/noc21_cs44/preview
                                                                                         8
                        3.   Dhananjay M. Dhamdhere, “Operating Systems – A Concept Based 11.                                  https://nptel.ac.in/courses/106/105/106105172/
                             Approach”, Third Edition, Tata McGraw Hill Edition, 2019
                        4.   Andrew S. Tanenbaum, “Modern Operating Systems”, Fourth Edition, Global
                             Edition, Pearson, 2015.
                        5.   William Stallings, “Operating Systems: Internals and Design Principles”,
                             Pearson Education, Sixth Edition, 2018.
                        6.   Charles Crowley, “Operating Systems: A Design-Oriented Approach”, Tata
                             McGraw Hill Education, 2017.
                             Level 6           Create           0%                        -                           -                 0%                           0%              -
                                       Total                            100 %                                                100 %                                         100 %
Course Designers
Experts from Industry                                              Experts from Higher Technical Institutions                                     Internal Experts
1. Mr.T.Madhan, Team Leader, Tata Consultancy Services,            1. Dr. S. Janakiraman, Associate Professor, Pondicherry
siruseri Campus,                                                   University,                                                                    1. Dr. N. Prasath, Associate Professor, SRMIST
Chennai, madhan.tk@gmail.com                                       sj.dbt@pondiuni.edu.in
2. Mrs.K.Saranya, IT Analyst, Tata Consultancy Services,           2. Dr. R.Shyamala, Associate Professor, Anna University
siruseri Campus, Chennai,                                          College of Engineering                                                         2. Dr. M. Eliazer, Assistant Professor, SRMIST
saranya.k6@gmail.com                                               Tindivanam, vasuchaaru@gmail.com
                                                                                                                9
               COURSE OBJECTIVES AND COURSE OUTCOMES
Course Objectives
The purpose of learning this course is to:
       Introduce the key role of an Operating system
       Insist the Process Management functions of an Operating system
       Emphasize the importance of Memory Management concepts of an Operating system
       Realize the significance of Device Management part of an Operating system
       Comprehend the need of File Management functions of an Operating system
       Explore the security services offered by the Operating system practically
Course Outcomes
At the end of this course, learners will be able to:
 CO1:     Use the appropriate concepts of operating system for resource utilization.
 CO2:     Choose the relevant process and thread concepts for solving synchronization problems.
 CO3:     Exemplify different types of scheduling algorithms and deadlock mechanism.
 CO4:     Experiment the performance of different algorithms used in management of
          memory, file and I/O and select the appropriate one.
 CO5:     Demonstrate different device and resource management techniques for
          memory utilization with security mechanisms
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 2 3
CO2 3 3 3 2 3
CO3 3 3 3 2 3
CO4 3 3 3 2 3
                                                   10
CO5   3   3   3   2        3
                      11
                                     LESSON PLAN
Hour                   Topic                CO             Ref.     Teaching      Assessment
 #                                                                  Method         Method
 1   Introduction, Computers- System        CO1             T2        Brain       Quiz, MCQ
     Organization, Computer-System                                  Storming
     Architecture
 2   Operating-System Structure, Operating- CO1             T2         BB         Descriptive
     System Operations, Process Management,                                       Questions
     Memory Management, Storage Management.
 14    Thread Libraries, Implicit Threading,         CO2   T1,T2    Role Play     Quiz, Open
       Threading Issues                                                           Book Test
                                                12
15   Introduction to process synchronization        CO2            Gaming/       Quiz, Open
                                                                  Animation      Book Test,
                                                                                 Assignment
18   Synchronization Hardware and Monitors.         CO2   T1,T2    BB, Brain     Quiz, Open
                                                                   Storming      Book Test,
                                                                                  Project
                                               13
  31    Segmentation and Paging                         CO4    T1     Presentation   Quiz, MCQ,
                                                                                     Descriptive
                                                                                      Questions
  32    Structure of page table                         CO4   T1,T2    Role Play     Quiz, MCQ,
                                                                                     Descriptive
                                                                                     Questions,
                                                                                       Project
  33    Virtual Memory- Allocation of frames            CO4    T1      Flipping      Quiz, MCQ,
                                                                      Classroom      Descriptive
                                                                                     Questions
                                                 14
Text Books:
T1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, John
Wiley & Sons
(Asia) Pvt. Ltd, Tenth Edition, 2018
T2. RamazElmasri, A. Gil Carrick, David Levine, “Operating Systems – A Spiral Approach “, Tata
McGraw Hill Edition,
2010
T3. Dhananjay M. Dhamdhere, “Operating Systems – A Concept Based Approach”, Third Edition,
Tata McGraw Hill
Edition, 2019
T4. Andrew S. Tanenbaum, “Modern Operating Systems”, Fourth Edition, Global Edition, Pearson,
2015.
T5. William Stallings, “Operating Systems: Internals and Design Principles”, Pearson Education, Sixth
Edition, 2018.
T6. Charles Crowley, “Operating Systems: A Design-Oriented Approach”, Tata McGraw Hill
Education, 2017.
                                             15
                    LIST OF PRACTICAL EXERCISES
                                          16
                          LEARNING ASSESSMENT PLAN
Create
                                              17
                                 COURSE ASSESSMENT PLAN
         Course Outcomes (CO)            Weightage CLA1     CLA2      CLA3     CLA4       CLP1       End-
                                                                                                     Sem
 CO 1- Use the appropriate concepts of     22%         √                           √         √         √
 operating system for resource
 utilization.
 CO2 - Choose the relevant process and     19%                  √                  √         √            √
 thread    concepts    for     solving
 synchronization problems.
 CO3 - Exemplify different types of        22%                  √                  √         √            √
 scheduling algorithms and deadlock
 mechanism.
 CO4 - Experiment the performance of       19%                            √        √         √            √
 different    algorithms     used in
 management of memory, file and I/O
 and select the appropriate one.
CO5 - Demonstrate different device         18%                            √        √         √            √
and resource management techniques
for memory utilization with security
mechanisms
TARGETS PLANNED
                                                     18
                         CYCLE TEST I
           PORTION, SCHEDULE AND QUESTION PATTERN
Theory
Portion     :   Unit 1 and 2
                        CYCLE TEST II
           PORTION, SCHEDULE AND QUESTION PATTERN
Theory
Portion     :   Unit 3 and 4
Theory
                                     19
                                       ASSIGNMENT
Theory
MINI PROJECT
Theory
LAB ASSESSMENT
    Approach to solution indicates the generalness (handle all types of data) and efficiency
     of the solution.
                                               20
   Source code should ensure the completeness of solution and follow coding standard
   Validate : Inclusion of appropriate validation check for input
   Dry run the program with two sample inputs
   Scalable : Ability to handle data of varied size
   Readable : Appropriate comments for the purpose of documentation
   Output as per the expected format
            Documentation                                               20
            Viva                                                        10
            Total                                                       100
                                               21
                 INNOVATIVE TEACHING METHODS
 Role Play
 Group Discussion
 Brain Storming
 Team Quiz
 Gaming
 Animation
 Flipping Class room
 Simulation
 Videos Lectures
 You tube channel for OS course
 Use of Online tool like Kahoot, Mentimeter, etc
                                     22
                          LIST OF COURSE COORDINATORS
/NWC
RESPONSIBILITIES
23