μ€λ²ν€λλ?νλ‘κ·Έλ¨μ μ€ννλ¦ λμ€μ λλ¨μ΄μ§ μμΉμ μ½λλ₯Ό μ€νμμΌμΌ ν λ , μΆκ°μ μΌλ‘ μκ°,λ©λͺ¨λ¦¬,μμμ΄ μ¬μ©λλ νμμ λλ€μ μ: μ΅μνμ Hardware(CPU + Memory) μμ Softwareκ° λμνλ κΈ°κ³Embedded System : νΉμ λͺ©μ μ
System call, Compiling Process, Micro Kernel v/s Monolithic Kernel, Kernel History
Program vs Process, Process State, PCB, Context Switching, Scheduler, Operations on Processes, fork, exec, MultiProcess, IPC, Memory Map
Thread, Single Thread, Multi Thread, Multi Programming, Parallel Programming, Thread History, Kernel Thread, Multi Thread Models, Thread issue
CPU burst vs I/O burst, Dispatcher, Preemtive vs non-preemptive, Scheduling Criteria, Scheduling Goals, Scheduling Algorithms (FIFO, SJF, ... )
Synchronization, Synchronization Problem, Critical Section, Race Condition, Requirements for Synchronization Tools, Lock, Semaphore, Monitors
Handling Deadlocks, Deadlock Characterization
Memory Management, Paging, VM, Contiguous Allocation, Fragmentation, Hole, Paging, Page Table, Segmentation
Virtual Memory, Demand Paging, Swap in/out, Page Fault, Page Replacement Algorithms, Thrashing
NAS, SAN, HDD, Disk scheduling Algorithms, RAID
I/O method, Direct I/O, Memory-Mapped I/O, Kernel I/O Structure, Goals of I/O Software, I/O Systems Layers
File system, File Operation, File Types, File Access, Directories, Protection
File System Implementation, In-Memory Structure, Virtual File System, Layered File System, On-Disk Structure, Free-Space Management, Directory Implem
Computer Security AS Cryptography, Security requirement triad (CIA Triad), Security Problem, The Morris Internet Worm, Shared key cryptography, ....