Lecture No. | Description | Lecture By |
---|---|---|
Lecture 1 | Operating System: Introduction, Role, Basic concepts | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 2 | Types of OS : Batch Systems, multi programming, time-sharing | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 3 | Types of OS : parallel, distributed and real-time systems | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 4 | Operating system structure, Operating system components | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 5 | Operating system services, System calls. | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 6 | Processes: Process Concept, Process Scheduling | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 7 | Operation on Processes, Cooperating Processes | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 8 | Threads | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 9 | CPU Scheduling: Basic Concepts, Scheduling Criteria | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 10 | Types of schedulers,Scheduling Algorithms | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 11 | Scheduling Algorithms- FIFO, SRT | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 12 | Scheduling Algorithms- FPPS, RR, MQ | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 13 | Multiple-Processor Scheduling, Real-Time Scheduling, Algorithm Evaluation | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 14 | Interprocess Communication and Synchronization: Background | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 15 | The Critical-Section Problem, Synchronization Hardware | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 16 | Semaphores, Classical Problems of Synchronization | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 17 | Critical Regions, Monitors, Message Passing. | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 18 | Deadlocks: Introduction, System Model | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 19 | Deadlock Characterization, Methods for Handling Deadlocks | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 20 | Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, Recovery from Deadlock | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 21 | Combined Approach to Deadlock Handling. | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 22 | Memory Management: Background, Logical vs. Physical Address space | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 23 | Swapping, Contiguous Allocation, Paging, Segmentation | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 24 | Segmentation with Paging , Virtual Memory: Introduction | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 25 | Demand Paging, Page Replacement, Page-replacement Algorithms | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 26 | Performance of Demand Paging, Allocation of Frames, Thrashing, Other Considerations | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 27 | Thrashing, Other Considerations, Demand Segmentation | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 28 | Device Management: Techniques for Device Management | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 29 | Dedicated Devices, Shared Devices | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 30 | Virtual Devices; Device Characteristics-Hardware Consideration | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 31 | Channels and Control Units | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 32 | Independent Device Operation, Buffering | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 33 | Multiple Paths, Block Multiplexing | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 34 | Device Allocation Consideration | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 35 | Secondary-Storage Structure: Disk Structure | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 36 | Disk Scheduling, Disk Management | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 37 | Swap-Space Management, Disk Reliability | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 38 | File-System Interface: File Concept | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 39 | Access Methods, Directory Structure | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 40 | File-System Implementation: Introduction, File-System Structure | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 41 | Basic File System, Allocation Methods | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 42 | Free-Space Management, Directory Implementation | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 43 | Security :The Security problem, Goals of protection | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 44 | Access matrix, Authentication, Program threats, System threats | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 45 | Intrusion detection , Cryptography | Lecture by , Lecture by , Lecture by , Lecture by |