|
|
Old version of the Textbook
Sections to Read in the text book (6th edition)
- Chapter 1 - Computer Systems Overview
- 1.1, 1.2, 1.3, 1.4, 1.5, 1.7 -- Read and understand.
- 1.6, Appendix 1B (esp Reentrant Procedures) - Skim.
- Appendix 1A - Of some interest.
- Problems : 1.1, 1.2, 1.6, 1.9, 1.12, 1.13, 1.14.
- Chapter 2 - Operating Systems Overview
- 2.1, 2.2, 2.3, 2.4, 2.7, 2.8 -- Read and understand.
- 2.5, 2.6 -- Skim.
- Review Questions : 2.2, 2.3, 2.4, 2.5, 2.9
- Chapter 3 - Process Description and Control
- 3.1, 3.2, 3.3, 3.4 -- Read and understand.
- 3.5, 3.6 -- Skim.
- Review Questions :
- Problems :
- Chapter 4 - Threads, SMP, and Microkernels
- 4.1, 4.2, 4.3, 4.6 -- Read and understand.
- 4.4, 4.5 -- Skim.
- Review Questions :
- Problems :
- Chapter 5 - Concurrency : Mutual Exclusion and Synchronization
- 5.1, 5.2, 5.3, 5.5, 5.6 -- Read and understand.
- Review Questions :
- Problems :
- Chapter 6 - Concurrency : Deadlock and Starvation
- 6.1-6 -- Read and understand.
- 6.7-10 -- Skim
- Review Questions :
- Problems :
- Chapter 7 - Memory Management
- 7.1-5 -- Read and understand.
- 7A -- Skim
- Review Questions :
- Problems :
- Chapter 8 - Virtual Memory
- 8.1-2 -- Read and understand.
- 8.3-5 -- Skim
- Review Questions :
- Problems :
- Chapter 9 - Uniprocessor Scheduling
- 9.1-2 -- Read and understand.
- 9.3 -- Skim
- Review Questions :
- Problems :
- Chapter 10 - Multiprocessor and Real-Time Scheduling
- 10.2 -- Read and understand.
- 10.3 -- Skim
- Review Questions :
- Problems :
- Chapter 11 - I/O Management and Disk Scheduling
- 11.1-7 -- Read and understand.
- 11.9 -- Skim
- Review Questions :
- Problems :
- Chapter 12 - File Management
- 12.1-7 -- Read and understand.
- 12.8,9 -- Skim.
- Review Questions :
- Problems :
- Chapter 14 - Computer Security Threats
- 14.1 -- Read and understand.
- 14.2-6 -- Skim
- Review Questions :
- Problems :
- Chapter 15 - Computer Security Techniques
- 15.1-2 -- Read and understand.
- 15.3-5 -- Skim
- Review Questions :
- Problems :
|