CS 537 Schedule (Spring 1998)

Note: there will be some adjustments to the schedule.

Lecture 1, 1/20: Introduction (Notes + Chapter 1 of Silberschatz&Calvin)
Lecture 2, 1/22: Overview of Computer Organization (Notes + Chapter 2 of Silberschatz&Calvin)

Lecture 3: Processes (definition, states, multitasking, inspection of processes, process control block inside the kernel) Lecture 4: Concept of address space and threads; ------------------ Synchronization and Concurrency ------------ Lecture 5: The synchronization problem and simple solutions; Lecture 6: semaphores, implementation; Lecture 7: semaphore examples; Lecture 8: monitors, monitor examples; Lecture 9: deadlocks and solutions; Lecture 10: concurrency and synchronization wrap up; ------------------ Process Scheduling ------------------------- Lecture 11: CPU scheduling in batch and time-share systems; Lecture 12: real-time scheduling disciplines, priority inverstion and solutions; ------------------ Memory Managment --------------------------- Lecture 13: Protection, kernel/user mode, system calls, interrupt handling; Lecture 14: Memory management: allocation and protection; secondary storage; address space revisited; Lecture 15: segmentation and paging; Lecture 16: page table organizations, TLB; Lecture 17: Demand paging, page fault services; Lecture 18: Page replacement algorithms; Lecture 19: Memory allocation in multitasking environments; ------------------ File System -------------------------------- Lecture 20: I/O devices and disks; Lecture 21: File systems and disk management; Example implementation: FAT; Lecture 22: Disk access characteristics, block allocation, and scheduling; Lecture 23: UNIX file system implementation; directory structures; Lecture 24: File system interfaces; Memory mapped files; File caching implementation; ---------------- Communciation and Distributed System ---------- Lecture 25: Inter-Process communications: message passing and shared memory; Lecture 26: Multi-processor operating systems; Lecture 27: Overview of networking protocols and implementation; Lecture 28: Distributed system primer; ---------------- Security -------------------------------------- Lecture 29: Operating system security overview; Lecture 30: UNIX security problems;