Topic | Name | Description |
---|---|---|
Course Introduction | ||
1.1: History of Operating Systems | Watch this video from 1:09:27 to the end. This video gives a nice overview of operating systems. |
|
Read this article. |
||
1.2: Operating System Structure | Watch this lecture. |
|
1.2.1: Abstract Computer Component Overview | Read this article. |
|
1.2.2: Functional Overview | Read this article that describes operating systems. |
|
1.3: Different Operating Systems Overview | Read this page and click on the links for more information on specific operating systems. |
|
1.3.1: 32-Bit vs. 64-Bit OS | Read this article. |
|
Read these questions and answers. |
||
1.3.2: UNIX-based | Read this white paper. |
|
1.3.2.1: Linux (Ubuntu, Fedora, etc.) | Read this article. |
|
1.3.2.2: Solaris | Read this article for an overview of the operating systems Solaris 8, Solaris 9, Solaris 10, and OpenSolaris. |
|
1.3.3: Windows | Read this article for a good overview of the Windows operating system. |
|
1.3.4: Mobile | Read this article. |
|
Read this article. |
||
Read this article. |
||
1.3.5: Real-Time | Read this article to give you a good overview of real-time systems. |
|
Read this article to give you an introduction to Embedded and Real-Time Operating Systems. |
||
Read this article for a good overview of real-time operating systems. |
||
Read this article for a good synopsis of many of the commercial real-time operating systems. |
||
Read this article. |
||
Read this article. |
||
2.1: Concurrency | Watch this video, which will be an introduction to Unit 2 and will touch on all topics outlined in this unit. |
|
Read this handout. |
||
2.2: Processes | Watch this video. |
|
Read these lecture notes. |
||
Read these slides. |
||
2.3: Threads | Read this article. |
|
Read these slides. |
||
Watch this video. |
||
Read this page. |
||
2.4: Context Switch | Read this article. |
|
Read this article. |
||
Read slides 4 through 10. |
||
Read this article. |
||
3.1: Synchronization: Relevance and Problems | Watch this lecture. |
|
Read chapter 1 on pages 1–6. |
||
3.2: Race Conditions | Read these slides. |
|
3.3: Semaphores | Watch this lecture. |
|
Read chapter 2 on pages 7–9 and chapter 4 on pages 61–120. |
||
Read this page. |
||
Watch this lecture. |
||
Read this document. |
||
4.1: Scheduling General Objective | Watch the first lecture from 54:30 to the end, and watch the second lecture until 31:00. |
|
Read this document. |
||
4.2: Goals | Read these notes. |
|
4.3: Types | Read the first seven slides. |
|
4.4: Algorithms | Read these slides. |
|
Unit 4 Exercises and Assessment | ||
5.1: Definition | Watch the first lecture starting at 52:40, and watch the second lecture until 43:15. |
|
Read these lecture notes. |
||
5.2: Deadlock Prevention and Avoidance | Read slides 10 through 16. |
|
Read through the review of the Banker's Algorithm if you need to review the way that the algorithm works. Complete both exercises and check your answers against the answer key. |
||
5.3: Deadlock Detection and Recovery | Read this document. |
|
Complete this lab. All instructions are included for downloading and running the simulator. Compare the results of your experiments to the answer key. |
||
6.1: Overview of Memory Management | Read these slides. |
|
6.1.1: Memory Hierarchy | Read this page. |
|
6.1.2: OS Interaction with Memory Levels | Read the first seven slides. |
|
6.1.3: Virtual Memory | Read these notes. |
|
Watch this lecture. |
||
6.2: Allocating Memory | Read these notes. |
|
Complete this assignment. You can check your answers against the answer key. |
||
6.3: Memory Access | Read these notes. |
|
Read this document. |
||
Read this article. |
||
Read these notes. |
||
7.1: Introduction to File Systems | Read this document. |
|
Watch this lecture. |
||
7.2: File Allocation Methods | Read this page and be sure to complete the simulations for each type of file management. |
|
Read these slides. |
||
7.3: Disk Management Algorithms | Read these slides. |
|
Watch the first lecture starting at 1:00:25, and watch the second lecture until 60:00. |
||
Read slides 4 through 15. |
||
Unit 7 Activities | Complete both parts of the lab. Compare your results to the second part with those contained in the answer key. |
|
Follow all directions and complete the laboratory. Save your results to a Word document as instructed and compare your results to the answer key. |
||
Review the material on disk management algorithms. Complete all problems. For problems 1 and 3, it might be easiest to use a spreadsheet to track the movement of the disk head as well as to calculate the number of cylinders moved. Compare your results with the answer key. |
||
8.1: Introduction to Security | Watch this video. |
|
Read this document. |
||
Read this document. |
||
8.2: Malicious Software Overview | Read these notes. |
|
Read these notes. |
||
8.3: Security Techniques | Read this page. |
|
Read this page. |
||
Watch these lectures. |
||
Read this publication up to the end of Chapter 3. |
||
9.1: Introduction | Watch this lecture. |
|
Read this introduction. |
||
Watch this lecture. |
||
9.2: Protocol Architecture | Watch this lecture. |
|
9.3: The Reference Models | Read this section. |
|
Read these slides. |
||
Read this section. |
||
Watch this animation. |
||
Watch this video. |
||
9.4: Network Intrusion Detection | Read chapters 4, 5, and 6. |
|
Study Guide | This study guide will help you get ready for the final exam. It discusses the key topics in each unit, walks through the learning outcomes, and lists important vocabulary terms. It is not meant to replace the course materials! |
|
Course Feedback Survey |