Home Operating Systems : MCA-106

Operating Systems : MCA-106

Lecture No.DescriptionLecture By
Lecture 1 Operating System: Introduction, Role, Basic conceptsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 2 Types of OS : Batch Systems, multi programming, time-sharingLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 3 Types of OS : parallel, distributed and real-time systemsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 4 Operating system structure, Operating system componentsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 5 Operating system services, System calls.Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 6 Processes: Process Concept, Process SchedulingLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 7 Operation on Processes, Cooperating ProcessesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 8 ThreadsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 9 CPU Scheduling: Basic Concepts, Scheduling CriteriaLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 10 Types of schedulers,Scheduling AlgorithmsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 11 Scheduling Algorithms- FIFO, SRTLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 12 Scheduling Algorithms- FPPS, RR, MQLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 13 Multiple-Processor Scheduling, Real-Time Scheduling, Algorithm EvaluationLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 14 Interprocess Communication and Synchronization: BackgroundLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 15 The Critical-Section Problem, Synchronization HardwareLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 16 Semaphores, Classical Problems of SynchronizationLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 17 Critical Regions, Monitors, Message Passing.Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 18 Deadlocks:  Introduction, System ModelLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 19 Deadlock Characterization, Methods for Handling DeadlocksLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 20 Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, Recovery from DeadlockLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 21 Combined Approach to Deadlock Handling.Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 22 Memory Management: Background, Logical vs. Physical Address spaceLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 23 Swapping, Contiguous Allocation, Paging, SegmentationLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 24 Segmentation with Paging , Virtual Memory: IntroductionLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 25 Demand Paging,  Page Replacement, Page-replacement AlgorithmsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 26 Performance of Demand Paging, Allocation of Frames,  Thrashing, Other ConsiderationsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 27 Thrashing, Other Considerations, Demand SegmentationLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 28 Device Management: Techniques for Device ManagementLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 29 Dedicated Devices, Shared DevicesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 30 Virtual Devices; Device Characteristics-Hardware ConsiderationLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 31 Channels and Control UnitsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 32 Independent Device Operation, BufferingLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 33 Multiple Paths, Block MultiplexingLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 34 Device Allocation ConsiderationLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 35 Secondary-Storage Structure: Disk StructureLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 36 Disk Scheduling, Disk ManagementLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 37 Swap-Space Management, Disk ReliabilityLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 38 File-System Interface: File ConceptLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 39 Access Methods, Directory StructureLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 40 File-System Implementation: Introduction, File-System StructureLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 41 Basic File System, Allocation MethodsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 42 Free-Space Management, Directory ImplementationLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 43 Security :The Security problem, Goals of protectionLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 44 Access matrix, Authentication, Program threats, System threatsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 45 Intrusion detection , CryptographyLecture by ,    Lecture by ,    Lecture by ,    Lecture by
[whatsapp]