Architecture, Operating -System Structure, Operating -System Operations, Process Management, Memory Management, Storage Management, Protection and Security, Kernel Data Structures, Computing Environments, Open -Source Operating Systems, Operating -System Services, User and Operating -System Interface, System Calls, Types of System Calls, System Programs, Operating -System Design and Implementation, Operating -System Structure, Operating -System Debugging, Operating -System Generation, System Boot Unit-2 : PROCESS MANAGEMENT: Process Concept, Process Scheduling, Operations on Processes, Interprocess Communication, Communication in Client– Server Systems, Threads: Multicore Programming, Multithreading Models, Thread Libraries, Implicit Threading, Threading Issues. Process Synchronization: The Critical -Section Problem, Peterson’s Solution, Synchronization Hardware, Mutex Locks, Semaphores, Classic Problems of Synchronization, Monitors. Unit -3: CPU Scheduling: Basic Concepts, Scheduling Criteria, Scheduling Algorithms, Thread Scheduling, Multiple -Processor Scheduling, Real -Time CPU Scheduling. Deadlocks: System Model, Deadlock Characterization, Methods for Handling Deadlocks, Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, Recovery from Deadlock. Unit -4 : MEMORY MANAGEMENT: Main Memory, Swapping, Contiguous Memory Allocation, Segmentation, Paging, Structure of the Page Table. Virtual Memory: Introduction, Demand Paging, Copy -on -Write, Page Replacement, Allocation of Frames, Thrashing, Memory -Mapped Files, Allocating Kernel Memory. STORAGE MANAGEMENT: Disk Structure, Disk Attachment, Disk Scheduling, Disk Management, Swap -Space Management, RAID Structure. File -System Interface: File Concept, Access Methods, Directory and Disk Structure, File- System Mounting, File Sharing, Protection. Unit-5: PROTECTION AND SECURITY: Goals of Protection, Principles of Protection, Domain of Protection, Access Matrix, Implementation of the Access Matrix, Access Control, Revocation of Access Rights, Capability-Based Systems, Language-Based Protection, The Security Problem, Program Threats, System and Network Threats, Cryptography as a Security Tool, User Authentication, Implementing Security Defenses, Firewalling to Protect Systems and Networks, Computer-Security Classifications.