
μ€λ²ν€λλ?νλ‘κ·Έλ¨μ μ€ννλ¦ λμ€μ λλ¨μ΄μ§ μμΉμ μ½λλ₯Ό μ€νμμΌμΌ ν λ , μΆκ°μ μΌλ‘ μκ°,λ©λͺ¨λ¦¬,μμμ΄ μ¬μ©λλ νμμ λλ€μ μ: μ΅μνμ Hardware(CPU + Memory) μμ Softwareκ° λμνλ κΈ°κ³Embedded System : νΉμ λͺ©μ μ

System call, Compiling Process, Micro Kernel v/s Monolithic Kernel, Kernel History

Program vs Process, Process State, PCB, Context Switching, Scheduler, Operations on Processes, fork, exec, MultiProcess, IPC, Memory Map

Thread, Single Thread, Multi Thread, Multi Programming, Parallel Programming, Thread History, Kernel Thread, Multi Thread Models, Thread issue

CPU burst vs I/O burst, Dispatcher, Preemtive vs non-preemptive, Scheduling Criteria, Scheduling Goals, Scheduling Algorithms (FIFO, SJF, ... )

Synchronization, Synchronization Problem, Critical Section, Race Condition, Requirements for Synchronization Tools, Lock, Semaphore, Monitors

Handling Deadlocks, Deadlock Characterization

Memory Management, Paging, VM, Contiguous Allocation, Fragmentation, Hole, Paging, Page Table, Segmentation

Virtual Memory, Demand Paging, Swap in/out, Page Fault, Page Replacement Algorithms, Thrashing

NAS, SAN, HDD, Disk scheduling Algorithms, RAID

I/O method, Direct I/O, Memory-Mapped I/O, Kernel I/O Structure, Goals of I/O Software, I/O Systems Layers

File system, File Operation, File Types, File Access, Directories, Protection

File System Implementation, In-Memory Structure, Virtual File System, Layered File System, On-Disk Structure, Free-Space Management, Directory Implem

Computer Security AS Cryptography, Security requirement triad (CIA Triad), Security Problem, The Morris Internet Worm, Shared key cryptography, ....