In der Lehrveranstaltung werden die Grundlagen von Standard-Betriebsystemen (General-Purpose Operating Systems) vermittelt. Techniken und Ansätze zur Implementierung von Nebenläufigkeit, Schedulern, Synchronisationsmechanismen, Speicherverwaltung und Sicherheitskomponenten werden an Beispielen diskutiert.
Abridged History of Operating Systems | 01:16:46 | |
---|---|---|
Addendum | 00:22:34 | |
What is an Operating System | 00:13:27 | |
The first Computer | 00:13:24 | |
Batch Processing | 00:09:28 | |
Time Sharing | 00:17:54 |
Operating System Concepts and Principles | 00:48:03 | |
---|---|---|
Program Invocation | 00:14:32 | |
Process Creation | 00:14:30 | |
Process Properties | 00:16:28 | |
Summary | 00:02:33 |
Gemeinsames Programmieren | 01:12:01 | |
---|---|---|
Organisatorisches | 00:02:29 | |
Programmieren | 01:09:32 |
Operating System Concepts and Principles 2 | 01:19:33 | |
---|---|---|
Organisatorisches | 00:11:51 | |
Tasks of an Operating System | 00:18:33 | |
User Mode vs. Kernel Mode | 00:20:09 | |
Windows Subsystems | 00:29:00 |
Operating System Concepts and Principles 3 | 01:07:39 | |
---|---|---|
Structure of the Windows Operating System | 00:23:36 | |
Kernel | 00:17:16 | |
Process-Based Code | 00:18:53 | |
Registry | 00:07:54 |
Unit 1 - Checkpoint | 01:15:28 | |
---|---|---|
What is an operating system? | 00:09:15 | |
Technology | 00:08:56 | |
Concepts | 00:36:36 | |
Structure | 00:20:41 |
Concurrency | 00:58:47 | |
---|---|---|
Concurrency | 00:10:52 | |
Parallelism | 00:15:55 | |
Concurrency experiments solutions | 00:13:02 | |
The critical section dilemma | 00:14:45 | |
Let's play Deadlock empire | 00:04:13 |
Concurrency 2 | 01:04:07 | |
---|---|---|
Multiprogramming | 00:12:19 | |
Solutions to the Critical Section Problem | 00:22:10 | |
Bakery Algorithm | 00:13:29 | |
Programming Exercise | 00:16:09 |
Concurrency 3 | 01:19:08 | |
---|---|---|
Nachtrag | 00:07:11 | |
Semaphores | 00:23:47 | |
Mutex API | 00:16:29 | |
Dispatch Object | 00:31:41 |
Interrupt Dispatching & Interprocess Communication | 01:16:47 | |
---|---|---|
Interrupt Handling | 00:23:07 | |
Deferred Procedure Calls | 00:11:43 | |
Inter-Process Communication | 00:17:48 | |
UNIX - Sockets | 00:19:38 | |
Exercise: Custom Shell | 00:04:31 |
Unit 2 - Checkpoint | 01:22:25 | |
---|---|---|
Preemption | 00:16:59 | |
Synchronization | 00:23:24 | |
Interrupts | 00:32:32 | |
Inter-Process Communication | 00:09:30 |
Scheduling ... maybe:) | 01:27:49 | |
---|---|---|
Scheduling | 00:16:30 | |
Inter-Process Communication | 00:07:32 | |
shm_open | 01:03:47 |
Scheduling | 01:20:08 | |
---|---|---|
Process Concept | 00:18:17 | |
Short-Term Scheduler | 00:13:46 | |
Optimization Criteria | 00:12:04 | |
Round Robin | 00:15:30 | |
Priority Scheduling | 00:14:26 | |
Multilevel Queue | 00:06:05 |
Scheduling 2 | 01:16:29 | |
---|---|---|
Process Creation | 00:22:35 | |
Single and Mulitheaded Processes | 00:24:09 | |
Exiting and Terminating a Process | 00:10:36 | |
Programmrahmen | 00:19:09 |
Scheduling 3 | 01:11:56 | |
---|---|---|
Windows Scheduling Criteria | 00:17:58 | |
Windows Priority Adjustments | 00:16:56 | |
Linux Scheduling | 00:13:27 | |
Symmetric Multiprocessing | 00:23:35 |
Unit 3 - Checkpoint | 01:20:42 | |
---|---|---|
Terminology | 00:06:40 | |
Scheduling | 00:54:50 | |
API | 00:19:12 |
Memory Management | 01:11:42 | |
---|---|---|
Address Binding | 00:14:42 | |
Logical vs. Physical Address Space | 00:10:32 | |
Memory Allocation Schemes | 00:25:19 | |
Memory Protection | 00:18:38 |
Memory Management 2 | 01:19:16 | |
---|---|---|
Address Translation | 00:14:45 | |
Exercise - Size of Page Tables | 00:19:49 | |
Managing Physical Memory | 00:44:42 |
Operating Systems Evolution | 01:31:35 | |
---|---|---|
Operating Systems Evolution | 00:23:07 | |
Boost | 00:19:23 | |
Windows Architecture | 00:35:18 | |
Paging Dynamics | 00:13:47 |
Memory Management 3 | 01:23:08 | |
---|---|---|
Shared Memory | 00:25:51 | |
Working Set Replacement | 00:22:04 | |
System Working Set | 00:18:31 | |
Q&A | 00:16:42 |
Unit 4 - Checkpoint | 01:31:16 | |
---|---|---|
Memory Management | 01:31:16 |
Trust and Dependability | 01:21:30 | |
---|---|---|
Trust | 00:13:47 | |
The Cost of Dependability | 00:15:46 | |
Authentication | 00:10:40 | |
Security Components | 00:21:09 | |
UNIX File Protection | 00:20:08 |
Trust and Dependability & Checkpoint Recap | 01:16:32 | |
---|---|---|
UNIX File Protection | 00:14:13 | |
Unit 1 - Checkpoint | 00:13:27 | |
Unit 2 - Checkpoint | 00:48:52 |
Checkpoint Recap | 01:13:35 | |
---|---|---|
Unit 3 - Checkpoint | 00:29:50 | |
Unit 4 - Checkpoint | 00:27:38 | |
Course Retrospective | 00:16:07 |