Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Islamabad Campus 1. Course Description: Course Syllabus This course covers general issues of design and implementation of advanced modern operating systems. The focus is on issues that are critical to the applications of distributed systems and computer networks, which include interprocess communication, distributed processing, sharing and replication of data and files. Approximately two third of the course will be devoted to basic concepts and techniques, and the remaining third will be on assorted current topics in modern operating systems and distributed systems. 2. Weekly Course Outline: S Chapters* 1 Operating system fundamentals 2 Distributed system concepts and Architecture 3 Concurrent process and programming IT for Business Session Topic Assess ments % Evolution of modern operating systems, centralized operating system overview, operating system structure, subsystem and microkernel, management functions, network operating systems, distributed operating system, cooperative autonomous systems, distributed algorithms Goals, transparency, services, primitive services, services by system servers, valueadded services, architecture models, distributed system architectures, communication network architecture, communication network protocols, OSI protocol suite, TCP/IP protocol suite, major design issues, object models and naming schemes, distributed coordination, interprocess communication, distributed resources, fault tolerance and security, distributed computing environment(DCE) Processes and threads, thread applications, user space thread implementation, kernel space thread implementation, graph models for process representation, the client/server model, time services, physical clock, logical clock, vector logical clocks, matrix logical clocks, Assign ment1 2% Quiz1 1% Page 1 of 4 Islamabad Campus 4 Concurrent process and programming 5 Interprocess communication and coordination 6 Interprocess communication and coordination 7 Distributed process scheduling 8 Distributed file systems 9 Distributed file systems IT for Business language mechanisms for synchronization, language constructs, shared-variable synchronization, message passing Assign synchronization, model resource servers, 2% ment1 concurrent programming languages, distributed and network programming, Orca, Java Message passing communication, basic communication primitives, message synchronization and buffering, pipe and Instruc socket APIs, secure sockets, group tor communication and multicast, request/reply Evaluat communication, RPC operations, RPC ion exception and failure handling, Secure RPC, transaction communication, the ACID properties, the Two-phase commit protocol, name and directory services, name and address resolution, object attributes and name structures, name space and information base, distributed mutual exclusion, Assign 2% contention-based mutual exclusion, token- ment2 based mutual exclusion, leader Election, complete topology, logical ring topology, tree topologies A system performance model, static process scheduling, precedence process scheduling, precedence process model, communication process model, dynamic load sharing and balancing, sender-initiated algorithms, receiver-initiated algorithms, distributed Quiz2 1% process implementation, remote service, remote execution, process migration, real time scheduling, rate monotonic, deadline monotonic, earliest deadline first, real time synchronization, priority ceiling protocol Characteristics of a DFS, DFS design and implementation, files and file systems, services and servers, file mounting and Midter 30 server registration, stateful and stateless file m %` servers, file access and semantics of sharing, version control, transaction and concurrency control, transaction services, serializability, Page 2 of 4 Islamabad Campus concurrency control protocols, Data and file replication, architecture for management of replicas, one copy serializability, quorum voting, gossip update propagation Nonuniform memory access architectures, performance and transparency, data migration and replication, memory consistency model, coherence and consistency, general access consistency model, synchronization access consistency, multiprocessor cache system, cache structure, cache coherence protocols, snooping cache and strong consistency, distributed shared memory, memory management algorithms, block owner and copy list, object-based DSM systems, implementation of DSM systems, DSM classification LAM architecture environment, consistency implementation, LAM software environment Fundamentals of computer security, security policies, models, mechanisms, security issues in distributed systems, distributed access control model, access control matrix, implementations of ACM, comparison of ACL and CL, Mandatory flow control models, information flow control, lattice model, multilevel security, cryptography, private-key cryptographic systems, public-key cryptographic systems, comparison cryptographic systems, authentication and key distribution, design of authentication protocols, evolution of authentication protocols, the Kerberos protocol, CCITT X.509 protocol, KSL protocol for multiple authentication, issues relevant to distributed security, complex security policies, covert channel, traffic analysis, audit. Assign ment3 2% Quiz3 1% Assign ment4 2% Case study Assign ment5 2% Project presentation Project 15 % 10 Distributed shared memory 11 Distributed shared memory 12 Distributed computer security 13 Distributed computer security 14 15 IT for Business Page 3 of 4 Islamabad Campus 16 Final Exam Final Exam Final Exam 40 % For Assignments Five Two-page summaries and critiques on either assigned papers, papers from the following venues, or from other venues with prior approval: Journals: ACM , IEEE Need to address the following: Summary of major innovations What are some intriguing aspects of the paper? How can the research be improved? IT for Business Page 4 of 4